%3CLINGO-SUB%20id%3D%22lingo-sub-1880417%22%20slang%3D%22en-US%22%3ERe%3A%20The%20Microsoft%20Cloud%20App%20Security%20(MCAS)%20Ninja%20Training%20is%20Here!%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1880417%22%20slang%3D%22en-US%22%3E%3CP%3EThank%20you%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F708110%22%20target%3D%22_blank%22%3E%40Sarahzin%3C%2FA%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThese%20are%20very%20valuable%20resources%20and%20as%20it%20has%20been%20said%20in%20video%2C%20it%20is%20good%20to%20have%20all%20resources%20in%20one%20place.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1883885%22%20slang%3D%22en-US%22%3ERe%3A%20The%20Microsoft%20Cloud%20App%20Security%20(MCAS)%20Ninja%20Training%20is%20Here!%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1883885%22%20slang%3D%22en-US%22%3E%3CP%20data-unlink%3D%22true%22%3ENote%26nbsp%3BMCAS%20and%20MDATP%20Integration%20does%20not%20work%20%26amp%3B%20is%20not%20supported%20if%20your%20organisation%20uses%20proxies.%26nbsp%3B%20Wasted%20some%20time%20on%20this%20dead%20end%20%3A(%3C%2Fimg%3E%3CBR%20%2F%3EHope%20in%20future%20MDATP%20can%20be%20used%20as%20data%20source%20to%20MCAS%20cloud%20app%20discovery%20when%20clients%20connect%20via%20proxies.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1885610%22%20slang%3D%22en-US%22%3ERe%3A%20The%20Microsoft%20Cloud%20App%20Security%20(MCAS)%20Ninja%20Training%20is%20Here!%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1885610%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F428798%22%20target%3D%22_blank%22%3E%40AlexMags%3C%2FA%3E%2C%20the%20Microsoft%20Defender%20for%20Endpoint%20(former%20MDATP)%20sensor%20does%20support%20and%20work%20with%20various%20methods%20of%20proxied%20connections%2C%20as%20documented%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fsecurity%2Fthreat-protection%2Fmicrosoft-defender-atp%2Fconfigure-proxy-internet%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehere%3C%2FA%3E.%20A%20challenging%20scenario%20though%20is%20when%20the%20network%20uses%20a%20forward%20proxy%20as%20a%20gateway%20to%20the%20Internet.%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fsecurity%2Fthreat-protection%2Fmicrosoft-defender-atp%2Finvestigate-behind-proxy%23use-network-protection-to-monitor-network-connection-behind-a-firewall%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EThis%20documentation%3C%2FA%3E%26nbsp%3Bmight%20help%20you%20to%20monitor%20connections%20behind%20a%20forward%20proxy%20through%20network%20events%20that%20originate%20from%20network%20protection.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1877343%22%20slang%3D%22en-US%22%3EThe%20Microsoft%20Cloud%20App%20Security%20(MCAS)%20Ninja%20Training%20is%20Here!%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1877343%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSTRONG%3EWelcome%20to%20the%20MCAS%20Ninja%20Training!%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-left%22%20image-alt%3D%22Updated%20Ninja%20Diagram.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F232959i6DB3D7C0A2A0D778%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22Updated%20Ninja%20Diagram.png%22%20alt%3D%22Updated%20Ninja%20Diagram.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3C%2FP%3E%3CDIV%20class%3D%22video-embed-center%20video-embed%22%3E%3CIFRAME%20class%3D%22embedly-embed%22%20src%3D%22https%3A%2F%2Fcdn.embedly.com%2Fwidgets%2Fmedia.html%3Fsrc%3Dhttps%253A%252F%252Fwww.youtube.com%252Fembed%252FXLIEOTmU72I%253Ffeature%253Doembed%26amp%3Bdisplay_name%3DYouTube%26amp%3Burl%3Dhttps%253A%252F%252Fwww.youtube.com%252Fwatch%253Fv%253DXLIEOTmU72I%26amp%3Bimage%3Dhttps%253A%252F%252Fi.ytimg.com%252Fvi%252FXLIEOTmU72I%252Fhqdefault.jpg%26amp%3Bkey%3Db0d40caa4f094c68be7c29880b16f56e%26amp%3Btype%3Dtext%252Fhtml%26amp%3Bschema%3Dyoutube%22%20width%3D%22200%22%20height%3D%22112%22%20scrolling%3D%22no%22%20title%3D%22YouTube%20embed%22%20frameborder%3D%220%22%20allow%3D%22autoplay%3B%20fullscreen%22%20allowfullscreen%3D%22true%22%3E%3C%2FIFRAME%3E%3C%2FDIV%3E%3CP%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EShort%20links%3A%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttp%253A%252F%252Faka.ms%252FMCASNinjaTraining%26amp%3Bdata%3D04%257C01%257CSarahzin.Chowdhury%2540microsoft.com%257Cba7fd479eba44af4960108d8872cab17%257C72f988bf86f141af91ab2d7cd011db47%257C1%257C0%257C637407973220527927%257CUnknown%257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%253D%257C1000%26amp%3Bsdata%3DRZPSVNDT7KJKPM8ZeWJOM79RNWZ%252B%252FmIwj0twuBWdRtU%253D%26amp%3Breserved%3D0%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttp%3A%2F%2Faka.ms%2FMCASNinjaTraining%3C%2FA%3E%26nbsp%3Band%20%3CA%20href%3D%22http%3A%2F%2Faka.ms%2FMCASNinja%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttp%3A%2F%2Faka.ms%2FMCASNinja.%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EHave%20you%20been%20wanting%20to%20secure%20your%20cloud%20resources%3F%20Do%20you%20have%20agreements%20with%20non-Microsoft%20cloud%20applications%3F%20Do%20you%20want%20to%20share%20your%20cloud%20security%20knowledge%20and%20experience%20with%20others%3F%20Wait%20no%20longer%2C%20the%20Microsoft%20Cloud%20App%20Security%20(MCAS)%20Ninja%20training%20is%20here!%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EI%20am%20very%20pleased%20to%20introduce%20my%20MCAS%20Ninja%20training%20to%20you.%20%26nbsp%3BMCAS%20has%20hundreds%20of%20amazing%20videos%20out%20there%20and%20it%20can%20sometimes%20be%20overwhelming%20with%20determining%20where%20to%20start%20and%20how%20to%20progress%20through%20different%20levels.%20Over%20the%20last%20few%20months%2C%20I%E2%80%99ve%20gone%20through%20all%20these%20and%20created%20this%20repository%20of%20training%20materials%20in%20an%20ascending%20order%E2%80%A6%20all%20in%20one%20central%20location!%20Please%20let%20me%20know%20what%20you%20think%20in%20the%20comments.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIn%20terms%20of%20overall%20structuring%2C%20the%20training%20sessions%20are%20split%20into%20three%20different%20knowledge%20levels%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%C2%B7%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%20Beginner%20(%3CSTRONG%3EFundamentals%3C%2FSTRONG%3E)%3C%2FP%3E%0A%3CP%3E%C2%B7%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%20Intermediate%20(%3CSTRONG%3EAssociate%3C%2FSTRONG%3E)%3C%2FP%3E%0A%3CP%3E%C2%B7%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%20Advanced%20(%3CSTRONG%3EExpert%3C%2FSTRONG%3E)%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CTABLE%3E%0A%3CTBODY%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22312%22%3E%3CP%3E%3CSTRONG%3EModule%3C%2FSTRONG%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22312%22%3E%3CP%3E%3CSTRONG%3EDescription%3C%2FSTRONG%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22312%22%3E%3CP%3E1.%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%20Level%201%3A%20Beginner%20(%3CSTRONG%3EFundamentals%3C%2FSTRONG%3E)%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22312%22%3E%3CP%3EIntroduction%20to%20Microsoft%20Cloud%20App%20Security%2C%20licensing%2C%20portal%20navigation%2C%20policy%20basics%2C%20and%20overall%20definitions.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22312%22%3E%3CP%3E2.%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%20Level%202%3A%20Intermediate%20(%3CSTRONG%3EAssociate%3C%2FSTRONG%3E)%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22312%22%3E%3CP%3ECapability%20demos%2C%20automatic%20governance%2C%20overall%20deployment%2C%20and%20integrations.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22312%22%3E%3CP%3E3.%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%20Level%203%3A%20Advanced%20(%3CSTRONG%3EExpert%3C%2FSTRONG%3E)%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22312%22%3E%3CP%3EPower%20automate%2C%203%3CSUP%3Erd%3C%2FSUP%3E%20party%20IdP%20integration%2C%20and%20advanced%20use%20case%20scenarios.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3C%2FTBODY%3E%0A%3C%2FTABLE%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIn%20addition%2C%20after%20each%20module%2Flevel%2C%20there%20will%20be%20a%20%3CSTRONG%3Eknowledge%20check%20%3C%2FSTRONG%3Ebased%20on%20the%20training%20material%20you%E2%80%99d%20have%20just%20finished!%20Since%20there%E2%80%99s%20a%20lot%20of%20content%2C%20the%20goal%20of%20the%20knowledge%20checks%20is%20to%20help%20you%20determine%20if%20you%20were%20able%20to%20get%20some%20of%20the%20major%20key%20takeaways.%20Lastly%2C%20there%E2%80%99ll%20be%20a%20fun%20%3CSTRONG%3Ecertificate%3C%2FSTRONG%3E%20issued%20at%20the%20end%20of%20the%20training%3A%20Disclaimer%3A%20%3CSTRONG%3EThis%20is%20not%20an%20official%20Microsoft%20certification%20and%20only%20acts%20as%20a%20way%20of%20recognizing%20your%20participation%20in%20this%20training%20content%3C%2FSTRONG%3E.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CFONT%20color%3D%22%23800080%22%3ENOTE%3A%20This%20training%20will%20be%20updated%20on%20a%20%3CSTRONG%3Equarterly%20basis%3C%2FSTRONG%3E%20to%20ensure%20you%20all%20have%20the%20latest%20and%20greatest%20material!%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ELet%20us%20know%20what%20you%20think!%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EP.S.%20I%20wanted%20to%20give%20my%20colleague%2C%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F809429%22%20target%3D%22_blank%22%3E%40DanEdwards%3C%2FA%3E%2C%20a%20huge%20kudos%20for%20helping%20me%20automate%20the%20certificate%20app%20and%20knowledge%20check!%20Thank%20you%2C%20Dan!%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CTABLE%3E%0A%3CTBODY%3E%0A%3CTR%3E%0A%3CTD%20colspan%3D%222%22%20width%3D%22623%22%3E%3CP%3E%3CSTRONG%3ELegend%2FAcronyms%3C%2FSTRONG%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22312%22%3E%3CP%3E%3CSTRONG%3E(D)%3C%2FSTRONG%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22312%22%3E%3CP%3E%3CSTRONG%3EMicrosoft%20Documentation%3C%2FSTRONG%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22312%22%3E%3CP%3E%3CSTRONG%3E(V)%3C%2FSTRONG%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22312%22%3E%3CP%3E%3CSTRONG%3EVideo%3C%2FSTRONG%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22312%22%3E%3CP%3E%3CSTRONG%3E(B)%3C%2FSTRONG%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22312%22%3E%3CP%3E%3CSTRONG%3EBlog%3C%2FSTRONG%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22312%22%3E%3CP%3EMCAS%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22312%22%3E%3CP%3EMicrosoft%20Cloud%20App%20Security%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22312%22%3E%3CP%3ERBAC%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22312%22%3E%3CP%3ERole-based%20access%20control%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22312%22%3E%3CP%3EMDATP%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22312%22%3E%3CP%3EMicrosoft%20Defender%20Advanced%20Threat%20Protection%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22312%22%3E%3CP%3EAATP%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22312%22%3E%3CP%3EAzure%20Advanced%20Threat%20Protection%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22312%22%3E%3CP%3EATP%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22312%22%3E%3CP%3EAdvanced%20Threat%20Protection%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22312%22%3E%3CP%3EAIP%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22312%22%3E%3CP%3EAzure%20Information%20Protection%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22312%22%3E%3CP%3EASC%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22312%22%3E%3CP%3EAzure%20Security%20Center%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22312%22%3E%3CP%3EAAD%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22312%22%3E%3CP%3EAzure%20Active%20Directory%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22312%22%3E%3CP%3ECASB%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22312%22%3E%3CP%3ECloud%20Access%20Security%20Broker%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22312%22%3E%3CP%3EMTP%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22312%22%3E%3CP%3EMicrosoft%20Threat%20Protection%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22312%22%3E%3CP%3EGCC%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22312%22%3E%3CP%3EGovernment%20Community%20Cloud%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22312%22%3E%3CP%3EGCC-H%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22312%22%3E%3CP%3EGovernment%20Community%20Cloud%20High%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3C%2FTBODY%3E%0A%3C%2FTABLE%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ENote%3A%20Threat%20protection%20product%20names%20from%20Microsoft%20are%20changing.%20Read%20more%20about%20this%20and%20other%20updates%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F%3Fp%3D91813%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3E%3CSTRONG%3Ehere%3C%2FSTRONG%3E%3C%2FA%3E.%20We'll%20be%20updating%20names%20in%20products%20and%20in%20the%20docs%20soon.%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3E%3CP%3EMicrosoft%20365%20Defender%20(previously%20Microsoft%20Threat%20Protection)%3C%2FP%3E%0A%3C%2FLI%3E%0A%3CLI%3E%3CP%3EMicrosoft%20Defender%20for%20Endpoint%20(previously%20Microsoft%20Defender%20Advanced%20Threat%20Protection)%3C%2FP%3E%0A%3C%2FLI%3E%0A%3CLI%3E%3CP%3EMicrosoft%20Defender%20for%20Office%20365%20(previously%20Office%20365%20Advanced%20Threat%20Protection)%3C%2FP%3E%0A%3C%2FLI%3E%0A%3CLI%3E%3CP%3EMicrosoft%20Defender%20for%20Identity%20(previously%20Azure%20Advanced%20Threat%20Protection)%3C%2FP%3E%0A%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EMCAS%20Ninja%20Training%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ELevel%3A%20Beginner%26nbsp%3B%20(Fundamentals)%20(%3CA%20title%3D%22Beginner%20Module%20Video%22%20href%3D%22http%3A%2F%2Faka.ms%2Fbeginnervideo%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EVideo%20Introduction%3C%2FA%3E)%3C%2FSTRONG%3E%3C%2FP%3E%0A%3COL%20class%3D%22lia-list-style-type-upper-roman%22%3E%0A%3CLI%3ECommunity%20Information%3COL%20class%3D%22lia-list-style-type-upper-alpha%22%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-cloud-app-security%2Fbd-p%2FMicrosoftCloudAppSecurity%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3EMCAS%20Tech%20Community%3C%2FA%3E%3COL%3E%0A%3CLI%3E%3CEM%3EThis%20is%20a%20Microsoft%20Cloud%20App%20Security%20(MCAS)%20Tech%20Community%20space%20that%20provides%20an%20opportunity%20to%20connect%20and%20discuss%20the%20latest%20news%2C%20updates%2C%20and%20best%20practices%20with%20Microsoft%20professionals%20and%20peers.%3C%2FEM%3E%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3C%2FLI%3E%0A%3CLI%3EUnderstanding%20CASBs%3COL%20class%3D%22lia-list-style-type-upper-alpha%22%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fquery.prod.cms.rt.microsoft.com%2Fcms%2Fapi%2Fam%2Fbinary%2FRE3nibJ%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3ETop%2020%20Use%20Cases%20for%20CASBs%3C%2FA%3E%20%3CSTRONG%3E(D)%3C%2FSTRONG%3E%3COL%3E%0A%3CLI%3E%3CEM%3EThis%20document%20provides%20use%20cases%20which%20can%20be%20leveraged%20as%20a%20starting%20point%20during%20a%20proof%20of%20concept%20(POC)%2C%20or%20as%20you%E2%80%99re%20getting%20ready%20to%20deploy%20your%20CASB%20solution%20looking%20for%20ways%20to%20prioritize%20your%20deployment%20component.%3C%2FEM%3E%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3C%2FLI%3E%0A%3CLI%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-security-and%2Fmcas-ninja-what-s-a-casb-and-why-do-i-need-one%2Fba-p%2F1896575%3F_lrsc%3De428950e-de5e-45ff-b25f-b04fdb069bb8%22%20target%3D%22_blank%22%3EWhat%20is%20a%20CASB%20and%20Why%20Do%20I%20need%20one%3F%3C%2FA%3E%3CSTRONG%3E%26nbsp%3B(B)%3C%2FSTRONG%3E%3C%2FP%3E%0A%3COL%3E%0A%3CLI%3E%3CEM%3EA%20blog%20detailing%20an%20overview%20of%20CASBs%20and%20why%20they're%20important%20for%20securing%20your%20cloud%20resources.%26nbsp%3B%3C%2FEM%3E%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fcloud-app-security%2Fbest-practices%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EMCAS%20Best%20Practices%3C%2FA%3E%20%3CSTRONG%3E(D)%3C%2FSTRONG%3E%3COL%20class%3D%22lia-list-style-type-upper-alpha%22%3E%0A%3CLI%3E%3CEM%3EThis%20article%20provides%20best%20practices%20for%20protecting%20your%20organization%20by%20using%20Microsoft%20Cloud%20App%20Security.%20These%20best%20practices%20come%20from%20our%20overall%20experience%20working%20with%20Cloud%20App%20Security%20and%20from%20the%20experiences%20from%20customers%20like%20you.%3C%2FEM%3E%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3C%2FLI%3E%0A%3CLI%3EMCAS%20Introduction%3COL%20class%3D%22lia-list-style-type-upper-alpha%22%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DdUcaksuW8ao%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EMCAS%20Licensing%3C%2FA%3E%20%3CSTRONG%3E(V)*subject%20to%20change*%3C%2FSTRONG%3E%3COL%20class%3D%22lia-list-style-type-upper-roman%22%3E%0A%3CLI%3E%3CEM%3EQuestions%20on%20MCAS%20licensing%3F%20Contact%20your%20Microsoft%20reseller%20or%20Microsoft%20Partner.%3C%2FEM%3E%3C%2FLI%3E%0A%3CLI%3E%3CEM%3E%3CA%20href%3D%22https%3A%2F%2Fquery.prod.cms.rt.microsoft.com%2Fcms%2Fapi%2Fam%2Fbinary%2FRE2NXYO%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EMCAS%20License%20Datasheet%3C%2FA%3E%20%3C%2FEM%3E%3CSTRONG%3E(D)%3C%2FSTRONG%3E%3C%2FLI%3E%0A%3CLI%3E%3CEM%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fcloud-app-security%2Feditions-cloud-app-security-o365%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EDifferences%20between%20MCAS%20and%20OCAS%3C%2FA%3E%20%3C%2FEM%3E%3CSTRONG%3E(D)%3C%2FSTRONG%3E%3C%2FLI%3E%0A%3CLI%3E%3CEM%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fcloud-app-security%2Feditions-cloud-app-security-aad%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EDifferences%20between%20MCAS%20and%20CAD%3C%2FA%3E%20%3C%2FEM%3E%3CSTRONG%3E(D)%3C%2FSTRONG%3E%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3C%2FLI%3E%0A%3CLI%3E%3CA%20style%3D%22font-family%3A%20inherit%3B%20background-color%3A%20%23ffffff%3B%22%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DfM3_0P8MFUo%26amp%3Bt%3D1509s%26amp%3Bab_channel%3DMicrosoftSecurityCommunity%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EMicrosoft%20Cloud%20App%20Security%20Introduction%3C%2FA%3E%26nbsp%3B%3CSTRONG%3E(V)%3C%2FSTRONG%3E%3COL%3E%0A%3CLI%3E%3CEM%3EThis%20is%20an%20introductory%20video%20presentation%20of%20Microsoft's%20Cloud%20Access%20Security%20Broker%20(CASB)%3A%20Microsoft%20Cloud%20App%20Security%20(MCAS).%20%3C%2FEM%3E%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3C%2FLI%3E%0A%3CLI%3EInitial%20Settings%3COL%20class%3D%22lia-list-style-type-upper-alpha%22%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DMbKp4XQTS9A%26amp%3Blist%3DPLXPr7gfUMmKxS1SYNgDaQY-9Q6cOqFxvG%26amp%3Bindex%3D4%26amp%3Bt%3D0s%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EConfigure%20IP%20Addresses%3C%2FA%3E%20%3CSTRONG%3E(V)%3C%2FSTRONG%3E%3COL%3E%0A%3CLI%3E%3CEM%3EThis%20video%20shows%20you%20how%20to%20add%20your%20organization's%20IP%20address%20ranges%20to%20remove%20complexities%20from%20policy%20creation%2C%20investigation%2C%20and%20improve%20the%20accuracy%20of%20your%20alerts.%3C%2FEM%3E%3C%2FLI%3E%0A%3CLI%3E%3CEM%3EFor%20more%20information%2C%20check%20out%20this%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fcloud-app-security%2Fip-tags%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Earticle%3C%2FA%3E.%20%3CSTRONG%3E(D)%3C%2FSTRONG%3E%3C%2FEM%3E%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DvdPr6dXeVfo%26amp%3Blist%3DPLXPr7gfUMmKxS1SYNgDaQY-9Q6cOqFxvG%26amp%3Bindex%3D5%26amp%3Bt%3D0s%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EImport%20User%20Groups%3C%2FA%3E%20%3CSTRONG%3E(V)%3C%2FSTRONG%3E%3COL%3E%0A%3CLI%3E%3CEM%3EThis%20video%20shows%20you%20how%20to%20important%20user%20groups%20into%20MCAS%20to%20help%20create%20relevant%20policies.%3C%2FEM%3E%3C%2FLI%3E%0A%3CLI%3E%3CEM%3EFor%20more%20information%2C%20check%20out%20this%20%3C%2FEM%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fcloud-app-security%2Fuser-groups%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3E%3CEM%3Earticle%3C%2FEM%3E%3C%2FA%3E%3CEM%3E.%20%3CSTRONG%3E(D)%3C%2FSTRONG%3E%3C%2FEM%3E%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DkLbbWIDocaU%26amp%3Blist%3DPLXPr7gfUMmKxS1SYNgDaQY-9Q6cOqFxvG%26amp%3Bindex%3D6%26amp%3Bt%3D0s%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EConfigure%20Admin%20Roles%3C%2FA%3E%20%3CSTRONG%3E(V)%3C%2FSTRONG%3E%3COL%3E%0A%3CLI%3E%3CEM%3EIn%20this%20video%2C%20we%20show%20you%20how%20to%20configure%20admin%20roles%20and%20setup%20role-based%20access%20controls.%3C%2FEM%3E%3C%2FLI%3E%0A%3CLI%3E%3CEM%3EFor%20more%20information%2C%20check%20out%20this%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fcloud-app-security%2Fmanage-admins%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Earticle%3C%2FA%3E.%20%3CSTRONG%3E(D)%3C%2FSTRONG%3E%3C%2FEM%3E%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DEKcP72EZG-4%26amp%3Blist%3DPLhTS5hnNCfqdxyqr9JOMifwk_cZmBBz9Z%26amp%3Bindex%3D5%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EConfigure%20MSSP%20Access%3C%2FA%3E%3CSTRONG%3E%20(V)%3C%2FSTRONG%3E%3COL%3E%0A%3CLI%3E%3CEM%3EThe%20above%20video%20walks%20you%20through%20adding%20Managed%20Security%20Service%20Provider%20(MSSP)%20access%20to%20MCAS.%3C%2FEM%3E%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3C%2FLI%3E%0A%3CLI%3ECloud%20Discovery%3COL%20class%3D%22lia-list-style-type-upper-alpha%22%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fcloud-app-security%2Fdaily-activities-to-protect-your-cloud-environment%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EDashboard%20Basics%3C%2FA%3E%20%3CSTRONG%3E(D)%3C%2FSTRONG%3E%3COL%3E%0A%3CLI%3E%3CEM%3EThe%20above%20article%20gives%20an%20overview%20on%20how%20to%20work%20with%20MCAS%20daily%20while%20providing%20a%20few%20tips%20on%20how%20to%20navigate%20the%20portal.%3C%2FEM%3E%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fcloud-app-security%2Fdiscovered-apps%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EDiscovered%20Apps%3C%2FA%3E%20%3CSTRONG%3E(D)%3C%2FSTRONG%3E%3COL%3E%0A%3CLI%3E%3CEM%3EThe%20above%20article%20provides%20guidance%20on%20how%20to%20work%20with%20discovered%20apps%20and%20the%20steps%20to%20take%20to%20dive%20deep%20into%20what%20the%20dashboard%20offers.%3C%2FEM%3E%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DvMFyBZh7pyI%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EApp%20Risk%20Scoring%3C%2FA%3E%3CSTRONG%3E%20(V)%3C%2FSTRONG%3E%3COL%3E%0A%3CLI%3E%3CEM%3EThis%20video%20provides%20an%20overview%20on%20how%20MCAS%20evaluates%20the%20risk%20over%20discovered%20SaaS%20apps%20in%20your%20environment.%3C%2FEM%3E%3C%2FLI%3E%0A%3CLI%3E%3CEM%3EFor%20more%20information%2C%20check%20out%20this%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fcloud-app-security%2Frisk-score%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Earticle%3C%2FA%3E.%20%3CSTRONG%3E(D)%3C%2FSTRONG%3E%3C%2FEM%3E%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DdEF55m39D-Q%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EMCAS%20App%20Connectors%3C%2FA%3E%3CSTRONG%3E%20(V)%3C%2FSTRONG%3E%3COL%3E%0A%3CLI%3E%3CEM%3EThis%20video%20provides%20a%20brief%20introduction%20on%20MCAS%203%3CSUP%3Erd%3C%2FSUP%3E%20party%20SaaS%20connectors.%3C%2FEM%3E%3C%2FLI%3E%0A%3CLI%3E%3CEM%3EFor%20more%20information%2C%20check%20out%20this%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fcloud-app-security%2Fenable-instant-visibility-protection-and-governance-actions-for-your-apps%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Earticle%3C%2FA%3E.%20%3CSTRONG%3E(D)%3C%2FSTRONG%3E%3C%2FEM%3E%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DSWznxkJZHXY%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EUsing%20the%20Cloud%20App%20Discovery%20Feature%3C%2FA%3E%3CSTRONG%3E%20(V)%3C%2FSTRONG%3E%3COL%3E%0A%3CLI%3E%3CEM%3EThis%20is%20a%20video%20overview%20of%20MCAS%20and%20its%20discovery%20functions.%20%3C%2FEM%3E%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3C%2FLI%3E%0A%3CLI%3EInformation%20Protection%20and%20Real-time%20Controls%3COL%20class%3D%22lia-list-style-type-upper-alpha%22%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DA10oxaxSj_Q%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EConnect%20Office%20365%3C%2FA%3E%20%3CSTRONG%3E(V)%3C%2FSTRONG%3E%3COL%3E%0A%3CLI%3E%3CEM%3EThis%20video%20demonstrates%20how%20to%20connect%20Office%20365%20to%20Microsoft%20Cloud%20App%20Security%20and%20enable%20our%20powerful%20capabilities%20across%20DLP%2C%20Threat%20Protection%2C%20and%20more.%3C%2FEM%3E%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DDyC0eV_pMhs%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EConfigure%20AAD%20with%20MCAS%20Conditional%20Access%20App%20Control%3C%2FA%3E%20%3CSTRONG%3E(V)%3C%2FSTRONG%3E%3COL%3E%0A%3CLI%3E%3CEM%3EIn%20this%20video%2C%20we%20walk%20you%20through%20how%20to%20configure%20real-time%20monitoring%20and%20control%20across%20your%20cloud%20apps%20leveraging%20our%20powerful%2C%20native%20integration%20with%20Azure%20AD%20Conditional%20Access.%3C%2FEM%3E%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DCvsjM8TX81c%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EWhat%20is%20Conditional%20Access%20App%20Control%3F%3C%2FA%3E%20%3CSTRONG%3E(V)%3C%2FSTRONG%3E%3COL%3E%0A%3CLI%3E%3CEM%3EIn%20this%20video%2C%20we%20explore%20what%20Conditional%20Access%20App%20Control%20is%2C%20how%20to%20deploy%20and%20configure%20it%2C%20and%20testing%20of%20a%20scenario%20(Microsoft%20Teams).%3C%2FEM%3E%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fcloud-app-security%2Fuse-case-proxy-block-session-aad%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EBlock%20Sensitive%20Information%20Downloads%3C%2FA%3E%20%3CSTRONG%3E(D)%3C%2FSTRONG%3E%3COL%3E%0A%3CLI%3E%3CEM%3EThe%20above%20article%20walks%20you%20through%20a%20tutorial%20on%20how%20to%20create%20a%20session%20policy%20to%20block%20the%20download%20of%20sensitive%20information.%3C%2FEM%3E%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3C%2FLI%3E%0A%3CLI%3EThreat%20Detection%3COL%20class%3D%22lia-list-style-type-upper-alpha%22%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DfpAZ9l_lOWw%26amp%3Blist%3DPLXPr7gfUMmKxS1SYNgDaQY-9Q6cOqFxvG%26amp%3Bindex%3D19%26amp%3Bt%3D0s%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EThreat%20Detection%20Overview%3C%2FA%3E%3CSTRONG%3E%3CU%3E%20(V)%3C%2FU%3E%3C%2FSTRONG%3E%3COL%3E%0A%3CLI%3E%3CEM%3EThe%20above%20video%20walks%20you%20through%20MCAS%E2%80%99s%20threat%20detection%20capabilities%20that%20allow%20you%20to%20identify%20advanced%20attackers%20and%20insider%20threats.%3C%2FEM%3E%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3Duw8TCuNonhU%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EUser%20and%20Entity%20Behavior%20Analytics%3C%2FA%3E%3CSTRONG%3E%20(V)%3C%2FSTRONG%3E%3COL%3E%0A%3CLI%3E%3CEM%3EThis%20video%20provides%20a%20brief%20overview%20on%20User%20%26amp%3B%20Entity%20Behavior%20Analytics%20(UEBA)%20in%20MCAS.%3C%2FEM%3E%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DegqjPhdaqFE%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EDiscover%20and%20Mange%20risky%20OAuth%20applications%3C%2FA%3E%3CSTRONG%3E%20(V)%3C%2FSTRONG%3E%3COL%3E%0A%3CLI%3E%3CEM%3EThis%20video%20discusses%20how%20MCAS%20can%20help%20you%20identify%20when%20users%20authorize%20OAuth%20apps%2C%20detect%20risky%20apps%2C%20and%20revoke%20access%20to%20risky%20apps.%3C%2FEM%3E%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3CP%3E%3CFONT%20size%3D%224%22%20color%3D%22%23800080%22%3E%3CU%3E%3CSTRONG%3E%3CA%20title%3D%22Beg%20Knowledge%20Check%22%20href%3D%22http%3A%2F%2Faka.ms%2FMCASNinjaBeg%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3ELevel%3A%20Beginner%20(Fundamentals)%20Knowledge%20Check%3C%2FA%3E%3C%2FSTRONG%3E%3C%2FU%3E%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ELevel%3A%20Intermediate%20(Associate)%20(%3CA%20title%3D%22Intermediate%20Module%20Video%22%20href%3D%22http%3A%2F%2Faka.ms%2Fintermediatevideo%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EVideo%20Introduction%3C%2FA%3E)%26nbsp%3B%3C%2FSTRONG%3E%3C%2FP%3E%0A%3COL%20class%3D%22lia-list-style-type-upper-roman%22%3E%0A%3CLI%3EOverview%3COL%20class%3D%22lia-list-style-type-upper-alpha%22%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DfM3_0P8MFUo%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EMicrosoft%20Cloud%20App%20Security%3A%20Overview%3C%2FA%3E%3CSTRONG%3E%20(V)%3C%2FSTRONG%3E%3COL%3E%0A%3CLI%3E%3CEM%3EThis%20is%20an%20overview%20video%20discussing%20the%20different%20pillars%20and%20configuration%20steps%20for%20MCAS%20with%20a%20demo.%3C%2FEM%3E%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3C%2FLI%3E%0A%3CLI%3ECloud%20Discovery%3COL%20class%3D%22lia-list-style-type-upper-alpha%22%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Fmslearn.cloudguides.com%252Fen-us%252Fguides%252FDiscover%252C%252520protect%252C%252520and%252520control%252520your%252520apps%252520with%252520Microsoft%252520Cloud%252520App%252520Security%26amp%3Bdata%3D02%257C01%257CSebastien.Molendijk%2540microsoft.com%257Cb1efbed7541e4e4de73408d7ed16b66b%257C72f988bf86f141af91ab2d7cd011db47%257C1%257C0%257C637238554231675917%26amp%3Bsdata%3D0gW8A%252BoJr%252BPRmVO31HAzUOsLleLyV4Wv3y4MZBf7Krg%253D%26amp%3Breserved%3D0%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3ECloud%20Discovery%20Interactive%20Guide%3C%2FA%3E%20%3CSTRONG%3E(V)%3C%2FSTRONG%3E%3COL%3E%0A%3CLI%3E%3CEM%3EThis%20interactive%20guide%20walks%20you%20through%20discovering%2C%20protecting%2C%20and%20controlling%20your%20apps.%3C%2FEM%3E%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fcloud-app-security%2Fpolicies-cloud-discovery%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3ECloud%20Discovery%20Policies%3C%2FA%3E%20%3CSTRONG%3E(D)%3C%2FSTRONG%3E%3COL%3E%0A%3CLI%3E%3CEM%3EThe%20above%20article%20walks%20you%20through%20creating%20cloud%20discovery%20policies%20within%20your%20MCAS%20environment.%3C%2FEM%3E%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DVpAQ3jSrwws%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EMCAS%20and%20MDATP%20Integration%3C%2FA%3E%3CSTRONG%3E%20(V)%3C%2FSTRONG%3E%3COL%3E%0A%3CLI%3E%3CEM%3EThis%20video%20walks%20through%20the%20process%20of%20Integrating%20MDATP%20and%20MCAS%20and%20how%20simple%20the%20integration%20is%E2%80%94without%20requiring%20extra%20agents%20or%20proxies.%3C%2FEM%3E%3C%2FLI%3E%0A%3CLI%3E%3CEM%3EFor%20more%20information%2C%20check%20out%20this%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fcloud-app-security%2Fwdatp-integration%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Earticle%3C%2FA%3E.%20%3CSTRONG%3E(D)%3C%2FSTRONG%3E%3C%2FEM%3E%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DKRssd-2n3cs%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3ELog%20Collector%20Configuration%3C%2FA%3E%20%3CSTRONG%3E(V)%3C%2FSTRONG%3E%3COL%3E%0A%3CLI%3E%3CEM%3EAn%20overview%20on%20using%20the%20log%20collector%20to%20enable%20cloud%20discovery%20and%20a%20walk-through%20on%20deployment.%3C%2FEM%3E%3C%2FLI%3E%0A%3CLI%3EFor%20guidance%20on%20log%20collector%20deployment%2C%20choose%20your%20deployment%20mode%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fcloud-app-security%2Fdiscovery-docker%23deployment-modes%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehere%3C%2FA%3E%20and%20follow%20the%20accompanying%20steps.%20%3CSTRONG%3E(D)%3C%2FSTRONG%3E%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fcloud-app-security%2Fzscaler-integration%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EIntegrate%20with%20Zscaler%3C%2FA%3E%20%3CSTRONG%3E(D)%3C%2FSTRONG%3E%3COL%3E%0A%3CLI%3E%3CEM%3EIf%20you%20work%20with%20both%20Cloud%20App%20Security%20and%20Zscaler%2C%20you%20can%20integrate%20the%20two%20products%20to%20enhance%20your%20security%20Cloud%20Discovery%20experience.%3C%2FEM%3E%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fcloud-app-security%2Fiboss-integration%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EIntegrate%20with%20iboss%3C%2FA%3E%20%3CSTRONG%3E(D)%3C%2FSTRONG%3E%3COL%3E%0A%3CLI%3E%3CEM%3EIf%20you%20work%20with%20both%20Cloud%20App%20Security%20and%20iboss%2C%20you%20can%20integrate%20the%20two%20products%20to%20enhance%20your%20security%20Cloud%20Discovery%20experience.%3C%2FEM%3E%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fcloud-app-security%2Fcorrata-integration%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EIntegrate%20with%20Corrata%3C%2FA%3E%20%3CSTRONG%3E(D)%3C%2FSTRONG%3E%3COL%3E%0A%3CLI%3E%3CEM%3EIf%20you%20work%20with%20both%20Cloud%20App%20Security%20and%20Corrata%2C%20you%20can%20integrate%20the%20two%20products%20to%20enhance%20your%20security%20Cloud%20Discovery%20experience%20for%20mobile%20app%20use.%3C%2FEM%3E%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3C%2FLI%3E%0A%3CLI%3EInformation%20Protection%20and%20Real-Time%20Controls%3COL%20class%3D%22lia-list-style-type-upper-alpha%22%3E%0A%3CLI%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-security-and%2Fconnect-your-favorite-apps-to-microsoft-cloud-app-security%2Fba-p%2F1835829%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3EConnect%20Box%2C%20Salesforce%2C%20and%20GitHub%20to%20MCAS%26nbsp%3B%3C%2FA%3E%3CFONT%20color%3D%22%23000000%22%3E%3CSTRONG%3E%3CSPAN%20style%3D%22font-family%3A%20inherit%3B%22%3E(B)%3C%2FSPAN%3E%3C%2FSTRONG%3E%3C%2FFONT%3E%3C%2FP%3E%0A%3COL%3E%0A%3CLI%3E%3CEM%3EThis%20blog%20contains%20a%26nbsp%3Bshort%20series%20of%20videos%20to%20help%20you%20with%20key%20points%20of%20integration.%3C%2FEM%3E%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3C%2FLI%3E%0A%3CLI%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-security-and%2Fsecure-your-github-deployment-using-microsoft-cloud-app-security%2Fba-p%2F1882423%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3ESecure%20and%20Connect%20Github%3C%2FA%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-security-and%2Fconnect-your-favorite-apps-to-microsoft-cloud-app-security%2Fba-p%2F1835829%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3E%26nbsp%3B%3C%2FA%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-security-and%2Fsecure-your-github-deployment-using-microsoft-cloud-app-security%2Fba-p%2F1882423%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3E%3CFONT%20color%3D%22%23000000%22%3E%3CSTRONG%3E%3CSPAN%20style%3D%22font-family%3A%20inherit%3B%22%3E(B)%3C%2FSPAN%3E%3C%2FSTRONG%3E%3C%2FFONT%3E%3C%2FA%3E%3C%2FP%3E%0A%3COL%3E%0A%3CLI%3EThis%20blog%20walks%20through%20how%20to%20secure%20and%20connect%20your%20GitHub%20instance%20in%20MCAS.%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3D_J9kctMKZTE%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EProtecting%20Storage%20Apps%20and%20Malware%20Detection%3C%2FA%3E%3CSTRONG%3E%20(V)%3C%2FSTRONG%3E%3COL%3E%0A%3CLI%3E%3CEM%3EThis%20video%20shows%20you%20how%20MCAS%20can%20help%20you%20protect%20your%20cloud%20storage%20apps%20and%20ensure%20that%20they%20are%20not%20infected%20with%20malware.%3C%2FEM%3E%3C%2FLI%3E%0A%3CLI%3E%3CEM%3EFor%20more%20information%2C%20please%20see%20this%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fcloud-app-security%2Fanomaly-detection-policy%23malware-detection%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Earticle%3C%2FA%3E.%20%3CSTRONG%3E(D)%3C%2FSTRONG%3E%3C%2FEM%3E%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DF3WTTKcKmGk%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EConfiguring%20a%20read-only%20mode%20for%20external%20users%3C%2FA%3E%20%3CSTRONG%3E(V)%3C%2FSTRONG%3E%3COL%3E%0A%3CLI%3E%3CEM%3EThis%20video%20walks%20you%20through%20one%20of%20the%20many%20use-cases%20focused%20on%20external%20users%20using%20Conditional%20Access%20App%20Control%2C%20our%20reverse%20proxy%20solution.%3C%2FEM%3E%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DLkP0UGBswsQ%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EBlock%20unauthorized%20browsers%20form%20accessing%20corporate%20web%20apps%3C%2FA%3E%20%3CSTRONG%3E(V)%3C%2FSTRONG%3E%3COL%3E%0A%3CLI%3E%3CEM%3EA%20video%20detailing%20the%20policy%20configuration%20required%20to%20block%20unauthorized%20browsers%20from%20accessing%20corporate%20web%20applications.%3C%2FEM%3E%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fcloud-app-security%2Fuse-case-admin-quarantine%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EUsing%20Admin%20Quarantine%20to%20investigate%20files%3C%2FA%3E%20%3CSTRONG%3E(D)%3C%2FSTRONG%3E%3COL%3E%0A%3CLI%3E%3CEM%3EThe%20above%20article%20is%20a%20tutorial%20helping%20you%20use%20admin%20quarantine%20to%20protect%20your%20files.%3C%2FEM%3E%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fcloud-app-security%2Fuse-case-information-protection%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EAutomatically%20apply%20labels%20to%20your%20sensitive%20files%3C%2FA%3E%20%3CSTRONG%3E(D)%3C%2FSTRONG%3E%3COL%3E%0A%3CLI%3E%3CEM%3EThe%20above%20article%20is%20a%20tutorial%20walking%20you%20through%20applying%20a%20label%20to%20a%20sensitive%20file.%20%3C%2FEM%3E%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fcloud-app-security%2Fpolicies-information-protection%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EInformation%20Protection%20Policies%3C%2FA%3E%20%3CSTRONG%3E(D)%3C%2FSTRONG%3E%3COL%3E%0A%3CLI%3E%3CEM%3EThe%20above%20article%20walks%20you%20through%20creating%20information%20protection%20policies%20within%20your%20MCAS%20environment.%3C%2FEM%3E%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3C%2FLI%3E%0A%3CLI%3EThreat%20Detection%3COL%20class%3D%22lia-list-style-type-upper-alpha%22%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fcloud-app-security%2Fpolicies-threat-protection%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EThreat%20Policies%3C%2FA%3E%20%3CSTRONG%3E(D)%3C%2FSTRONG%3E%3COL%3E%0A%3CLI%3E%3CEM%3EThe%20above%20article%20walks%20you%20through%20creating%20threat%20protection%20policies%20within%20your%20MCAS%20environment.%3C%2FEM%3E%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3C%2FLI%3E%0A%3CLI%3EAzure%20Advanced%20Threat%20Protection%20Integration%3COL%3E%0A%3CLI%3E%3CEM%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure-advanced-threat-protection%2Fmcas-integration%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EHow%20Azure%20ATP%20integrates%20with%20MCAS%3C%2FA%3E%20%3CSTRONG%3E(D)%3C%2FSTRONG%3E%3C%2FEM%3E%3C%2FLI%3E%0A%3CLI%3EThe%20above%20article%20is%20designed%20to%20help%20you%20understand%20and%20navigate%20the%20enhanced%20investigation%20experience%20in%20MCAS%20with%20Azure%20ATP.%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Fmslearn.cloudguides.com%252Fen-us%252Fguides%252FDetect%252520threats%252520and%252520manage%252520alerts%252520with%252520Microsoft%252520Cloud%252520App%252520Security%26amp%3Bdata%3D02%257C01%257CSebastien.Molendijk%2540microsoft.com%257Cb1efbed7541e4e4de73408d7ed16b66b%257C72f988bf86f141af91ab2d7cd011db47%257C1%257C0%257C637238554231685916%26amp%3Bsdata%3DEOSONHXuLXAU42ZcIkgSA1IlI2JodaCFmB2tMYNAl6Q%253D%26amp%3Breserved%3D0%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EDetect%20Threats%20and%20Manage%20Alerts%3C%2FA%3E%3CSTRONG%3E%20(V)%3C%2FSTRONG%3E%3COL%3E%0A%3CLI%3E%3CEM%3EThe%20interactive%20guide%20above%20walks%20you%20through%20the%20steps%20of%20managing%20threats%20and%20alerts.%20%3C%2FEM%3E%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3D5AU5IqLkhhw%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EMalware%20Hunting%20and%20Automatic%20Remediation%3C%2FA%3E%3CSTRONG%3E%20(V)%3C%2FSTRONG%3E%3COL%3E%0A%3CLI%3E%3CEM%3EThis%20video%20provides%20a%20brief%20overview%20of%20Malware%20Hunting%20in%20SaaS%20Apps%20using%20MCAS.%3C%2FEM%3E%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3CP%3E%3CA%20title%3D%22Intermediate%20Knowledge%20Check%22%20href%3D%22http%3A%2F%2Faka.ms%2FMCASNinjaInt%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3E%3CU%3E%3CSTRONG%3E%3CFONT%20size%3D%224%22%20color%3D%22%23800080%22%3ELevel%3A%20Intermediate%20(Associate)%20Knowledge%20Check%3C%2FFONT%3E%3C%2FSTRONG%3E%3C%2FU%3E%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ELevel%3A%20Advanced%20(Expert)%20(%3CA%20title%3D%22Advanced%20Video%20Introduction%22%20href%3D%22http%3A%2F%2Faka.ms%2Fadvancedvideo%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EVideo%20Introduction)%3C%2FA%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3COL%20class%3D%22lia-list-style-type-upper-roman%22%3E%0A%3CLI%3EPower%20Automate%20%3CA%20href%3D%22https%3A%2F%2Faka.ms%2FMCAS%2FAuto-Triage%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EBlog%20Series%3C%2FA%3E%3CU%3E%20%3CSTRONG%3E(B)%3C%2FSTRONG%3E%3C%2FU%3E%3COL%20class%3D%22lia-list-style-type-upper-alpha%22%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DHwFIciUHxoM%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3ETriage%20Infrequent%20Country%20Alerts%20using%20Power%20Automate%20and%20MCAS%3C%2FA%3E%20%26nbsp%3B%3CSTRONG%3E(V)%3C%2FSTRONG%3E%3COL%3E%0A%3CLI%3E%3CEM%3EA%20video%20walk-%20through%20on%20creating%20a%20new%20Power%20Automate%20Flow%20to%20automate%20the%20triage%20of%20Infrequent%20Country%20alerts%20in%20MCAS%20(Threat%20Protection%20Pillar).%20%3C%2FEM%3E%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DgDn7-u15t7E%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3ERequest%20user%20validation%20to%20reduce%20your%20SOC%20workload%3C%2FA%3E%20%26nbsp%3B%3CSTRONG%3E(V)%3C%2FSTRONG%3E%3COL%3E%0A%3CLI%3E%3CEM%3EA%20vide%20walk-through%20on%20using%20Power%20Automate%20Flow%20to%20request%20user%20validation%20for%20file%20sharing%20(Data%20Protection%20Pillar).%3C%2FEM%3E%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DHzxxcI_-7Rw%26amp%3Bfeature%3Demb_logo%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3ERequest%20for%20Manager%20Action%3C%2FA%3E%20%3CSTRONG%3E(V)%3C%2FSTRONG%3E%3COL%3E%0A%3CLI%3E%3CEM%3EThis%20video%20walks%20you%20through%20using%20Power%20Automate%20Flow%20to%20request%20manager%20validation%20for%20their%20team.%3C%2FEM%3E%3C%2FLI%3E%0A%3CLI%3E%3CEM%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-security-and%2Frequest-for-manager-action-using-mcas-amp-power-automate%2Fba-p%2F1694628%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3EStep-by-step%20guidance%3C%2FA%3E%20%3C%2FEM%3E%3CSTRONG%3E(B)%3C%2FSTRONG%3E%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DRapWRInUmHQ%26amp%3Bfeature%3Demb_title%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EAuto-disable%20malicious%20inbox%20rules%20using%20MCAS%20%26amp%3B%20Power%20Automate%3C%2FA%3E%20%3CSTRONG%3E(V)%3C%2FSTRONG%3E%3COL%3E%0A%3CLI%3E%3CEM%3EThis%20video%20walks%20you%20through%20a%20new%20Power%20Automate%20Flow%20on%20how%20to%20remove%20malicious%20inbox%20rules%20detected%20in%20your%20cloud%20environment.%3C%2FEM%3E%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3C%2FLI%3E%0A%3CLI%3E3%3CSUP%3Erd%3C%2FSUP%3E%20Party%20IdP%20Configuration%26nbsp%3B%3COL%20class%3D%22lia-list-style-type-upper-alpha%22%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fcloud-app-security%2Fproxy-idp-examples%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EPingOne%3C%2FA%3E%20%3CSTRONG%3E(D)%3C%2FSTRONG%3E%3COL%3E%0A%3CLI%3E%3CEM%3EThis%20document%20walks%20you%20through%20integrating%20PingOne%20with%20MCAS%20for%20Conditional%20Access%20App%20Control%20using%20Salesforce%20as%20an%20example.%3C%2FEM%3E%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3C%2FLI%3E%0A%3CLI%3EADFS%20%3CSTRONG%3E(Coming%20soon!)%3C%2FSTRONG%3E%3C%2FLI%3E%0A%3CLI%3EOkta%20%3CSTRONG%3E(Coming%20soon!)%3C%2FSTRONG%3E%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3C%2FLI%3E%0A%3CLI%3EConditional%20Access%20App%20Control%20steps%20for%20non-Microsoft%20SAAS%20applications%3COL%20class%3D%22lia-list-style-type-upper-alpha%22%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DS-Q44fMOSLk%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EWorkplace%20for%20Facebook%3C%2FA%3E%3CSTRONG%3E%20(V)%3C%2FSTRONG%3E%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DZ1wYE9xyOIM%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EBox%3C%2FA%3E%3CSTRONG%3E%20(V)%3C%2FSTRONG%3E%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DGpDtEo3HeKI%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3ESlack%3C%2FA%3E%3CSTRONG%3E%20(V)%3C%2FSTRONG%3E%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3C%2FLI%3E%0A%3CLI%3ESIEM%20Integrations%3COL%20class%3D%22lia-list-style-type-upper-alpha%22%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DNsgpvNRsscg%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EConnect%20Azure%20Sentinel%3C%2FA%3E%20%3CSTRONG%3E(V)%3C%2FSTRONG%3E%3COL%3E%0A%3CLI%3E%3CEM%3EThis%20video%20details%20how%20to%20connect%20Azure%20Sentinel%20(Microsoft's%20SIEM%20%2B%20SOAR%20product)%20to%20MCAS.%3C%2FEM%3E%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DYZr-New3yCI%26amp%3Bab_channel%3DSebastienMolendijk%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EAzure%20Sentinel%20Entities%20Enrichment%20(Users)%3C%2FA%3E%20%3CSTRONG%3E(V)%3C%2FSTRONG%3E%3COL%3E%0A%3CLI%3E%3CEM%3EThis%20video%20looks%20at%20how%20you%20can%20use%20the%20provided%20playbooks%20to%20enrich%20your%20impacted%20user%20profiles%2C%20and%20then%20consume%20it%20in%20Sentinel%2C%20ServiceNow%2C%20or%20Postman.%3C%2FEM%3E%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3Dql8x4rC6m9A%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EMicrosoft%20CAS%20Infrequent%20Country%20triage%20with%20Azure%20Sentinel%20and%20Logic%20Apps%3C%2FA%3E%20%3CSTRONG%3E(V)%3C%2FSTRONG%3E%3COL%3E%0A%3CLI%3E%3CEM%3EThis%20video%20walks%20you%20through%20the%20deployment%20of%20a%20playbook%20to%20using%20it%20to%20triage%20your%20Azure%20Sentinel%20incidents.%3C%2FEM%3E%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DY9-PCEdkxJg%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EConnect%20a%203%3CSUP%3Erd%3C%2FSUP%3E%20Party%20SIEM%3C%2FA%3E%20%3CSTRONG%3E(V)%3C%2FSTRONG%3E%3COL%3E%0A%3CLI%3E%3CEM%3EThis%20video%20details%20how%20to%20connect%20a%20third%20party%20SIEM%20to%20MCAS.%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%20%3C%2FEM%3E%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3C%2FLI%3E%0A%3CLI%3EAdvanced%20Scenarios%20and%20Guidance%3COL%20class%3D%22lia-list-style-type-upper-alpha%22%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DUAbLyEVCGGg%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EIndicators%20of%20Compromise%3C%2FA%3E%26nbsp%3B%20%3CSTRONG%3E(V)%3C%2FSTRONG%3E%3COL%3E%0A%3CLI%3E%3CEM%3EThis%20video%20walks%20you%20through%20how%20to%20create%20custom%20Indicators%20of%20Compromise%20in%20MCAS.%3C%2FEM%3E%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DV2HwDfoSA5w%26amp%3Blist%3DPLhTS5hnNCfqdxyqr9JOMifwk_cZmBBz9Z%26amp%3Bindex%3D15%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EMCAS%20and%20Microsoft%20Threat%20Protection%3C%2FA%3E%26nbsp%3B%20%3CSTRONG%3E(V)%3C%2FSTRONG%3E%3COL%3E%0A%3CLI%3E%3CEM%3EA%20video%20guide%20on%20how%20Microsoft%20is%20unifying%20our%20threat%20products.%3C%2FEM%3E%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3D_fQJ7oms5vQ%26amp%3Bfeature%3Dyoutu.be%26amp%3B_lrsc%3D48ea0e28-85f6-4da6-8a0b-668efd3d5279%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EBlock%20Apps%2FSites%20on%20iOS%20(Defender%20for%20Endpoint%20%2B%20MCAS)%3C%2FA%3E%3CSTRONG%3E%26nbsp%3B(V)%3C%2FSTRONG%3E%3COL%3E%0A%3CLI%3E%3CEM%3EA%20video%20walk-through%26nbsp%3Bon%20how%20to%20block%20apps%20and%20sites%20on%20iOS%20using%20Defender%20for%20iOS%20and%20using%20custom%20indicators%20of%20compromise%20from%20the%20Microsoft%20Cloud%20App%20Security%20%26amp%3B%20Microsoft%20Defender%20for%20Endpoint%20integration.%3C%2FEM%3E%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fcloud-app-security%2Fapi-introduction%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EMCAS%20API%20Documentation%3C%2FA%3E%20%3CSTRONG%3E(D)%3C%2FSTRONG%3E%3COL%3E%0A%3CLI%3E%3CEM%3EThe%20above%20article%20describes%20how%20to%20interact%20with%20Cloud%20App%20Security%20over%20HTTPS.%3C%2FEM%3E%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fcloud-app-security%2Flog-collector-proxy%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EConfiguring%20a%20Log%20Collector%20behind%20a%20Proxy%3C%2FA%3E%20%3CSTRONG%3E(D)%3C%2FSTRONG%3E%3COL%3E%0A%3CLI%3E%3CEM%3EThe%20above%20article%20walks%20you%20through%20further%20configuration%20to%20ensure%20your%20log%20collector%20works%20when%20behind%20a%20proxy.%3C%2FEM%3E%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3C%2FLI%3E%0A%3CLI%3EAdditional%20Blogs%20and%20Series%3COL%20class%3D%22lia-list-style-type-upper-alpha%22%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-security-and%2Fwelcome-to-the-mcas-ninja-blog-series%2Fba-p%2F1775379%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3ENinja%20Training%20Blog%20Series%3C%2FA%3E%20%3CSTRONG%3E(B)%3C%2FSTRONG%3E%3COL%3E%0A%3CLI%3E%3CEM%3EThis%20blog%20series%20dives%20into%20partner%20specific%20topics%20(such%20as%20ideas%20for%20managed%20services%2C%20reporting%20dashboards%2C%20playbooks%2C%20and%20more)%20that%20you%20can%20use%20to%20help%20your%20clients%20be%20successful%20with%20Microsoft%20Cloud%20App%20Security.%3C%2FEM%3E%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-security-and%2Falert-new-blog-series-mcas-data-protection%2Fba-p%2F1796898%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3EMCAS%20Data%20Protection%20Blog%20Series%3C%2FA%3E%20%3CSTRONG%3E(B)%3C%2FSTRONG%3E%3COL%3E%0A%3CLI%3E%3CEM%3EThis%20blog%20goes%20through%20different%20data%20protection%20scenarios%20based%20on%20questions%20the%20CxE%20team%20has%20received%20from%20customers.%20%3C%2FEM%3E%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-security-and%2Fsecuring-administrative-access-to-microsoft-cloud-app-security%2Fba-p%2F1754139%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3ESecuring%20Administrative%20Access%20to%20Microsoft%20Cloud%20App%20Security%20and%20Defender%20for%20Identities%3C%2FA%3E%20%3CSTRONG%3E(B)%3C%2FSTRONG%3E%3COL%3E%0A%3CLI%3E%3CEM%3EThis%20blog%20provides%20guidance%20on%20how%20to%20configure%20Azure%20AD%20Conditional%20Access%20to%20secure%20administrative%20access%20to%20Microsoft%20Cloud%20App%20Security%20(MCAS)%20and%20Defender%20for%20Identities%20(formerly%20Azure%20ATP).%3C%2FEM%3E%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-security-and%2Fsecurity-admins-mcas-and-block%2Fba-p%2F1777167%23%3A~%3Atext%3DAs%2520you%2520may%2520know%252C%2520access%2520to%2520MCAS%2520can%2Con%2520overall%2520MCAS%2520RBAC%252C%2520check%2520out%2520our%2520documentation%2521%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3ELimiting%20Inherited%20Roles%20from%20Azure%20Active%20Directory%20in%20MCAS%3C%2FA%3E%20%3CSTRONG%3E(B)%3C%2FSTRONG%3E%3COL%3E%0A%3CLI%3E%3CEM%3EThis%20blog%20goes%20over%20a%20customer%20scenario%20for%20MCAS%20and%20the%20steps%20that%20can%20be%20taken%20to%20meet%20their%20requirements%20on%20limiting%20inherited%20AAD%20roles%E2%80%99%20accesses%20in%20MCAS.%3C%2FEM%3E%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3C%2FLI%3E%0A%3CLI%3EImportant%20Announcements%3COL%20class%3D%22lia-list-style-type-upper-alpha%22%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-security-and%2Fa-unified-approach-to-data-loss-prevention-from-microsoft%2Fba-p%2F1694492%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3EUnified%20Data%20Loss%20Prevention%20Post%20Announcement%3C%2FA%3E%20%3CSTRONG%3E(B)%3C%2FSTRONG%3E%3COL%3E%0A%3CLI%3E%3CEM%3EThis%20blog%20details%20all%20the%20latest%20and%20greatest%20information%20protection%20improvements%20including%20the%20new%20changes%20for%20MCAS.%3C%2FEM%3E%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-security-and%2Fend-of-support-for-non-secure-cipher-suites-in-microsoft-cloud%2Fba-p%2F1596262%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3EMCAS%20is%20removing%20non-secure%20cipher%20suites%3C%2FA%3E%20%3CSTRONG%3E(B)%3C%2FSTRONG%3E%3COL%3E%0A%3CLI%3E%3CEM%3EThis%20blog%20provides%20an%20update%20on%20the%20non-secure%20cipher%20suites%20no%20longer%20supported%20by%20MCAS%20and%20the%20steps%20to%20take%20to%20prepare%20for%20this%20change.%3C%2FEM%3E%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-security-and%2Fannouncing-general-availability-of-unified-labeling-in-gcc-and%2Fba-p%2F1563215%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3EUnified%20Labeling%20is%20now%20generally%20available%20in%20GCC%20and%20GCC-H%20environments%3C%2FA%3E%20%3CSTRONG%3E(B)%3C%2FSTRONG%3E%3COL%3E%0A%3CLI%3E%3CEM%3EThis%20blog%20provides%20an%20update%20that%20information%20protection%20is%20available%20in%20our%20government%20tenants.%3C%2FEM%3E%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3CP%3E%3CFONT%20color%3D%22%23800080%22%3E%3CSTRONG%3E%3CU%3E%3CFONT%20size%3D%224%22%3E%3CA%20title%3D%22Level%3A%20Advanced%20(Expert)%20Knowledge%20Check%22%20href%3D%22http%3A%2F%2Faka.ms%2FMCASNinjaAdv%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3ELevel%3A%20Advanced%20(Expert)%20Knowledge%20Check%3C%2FA%3E%3C%2FFONT%3E%3C%2FU%3E%3C%2FSTRONG%3E%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EOnce%20you%E2%80%99ve%20finished%20the%20training%20and%20the%20knowledge%20checks%2C%20please%20go%20to%20our%20attestation%20portal%20to%20generate%20your%20certificate%20(you'll%20see%20it%20in%20your%20inbox%20within%203-5%20business%20days%20(%3CA%20title%3D%22Generate%20MCAS%20Ninja%20Certificate%22%20href%3D%22http%3A%2F%2Faka.ms%2FMCASNinjaCer%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3E%3CSTRONG%3Eclick%20here%3C%2FSTRONG%3E%3C%2FA%3E).%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWe%20have%20a%20great%20lineup%20of%20updates%20coming%20for%20the%20next%20rendition%20(next%20quarter).%20If%20you'd%20like%20anything%20covered%2C%20please%20comment%20below!%20In%20addition%2C%20please%20reach%20out%20to%20me%20directly%20if%20you%20have%20any%20content%20you'd%20like%20to%20include%20as%20well.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EI%20hope%20you%20all%20enjoy%20this%20training!%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-1877343%22%20slang%3D%22en-US%22%3E%3CP%3EA%20central%20training%20repository%20walking%20you%20through%20our%20MCAS%20Ninja%20Training%20to%20obtain%20MCAS%20expertise!%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-left%22%20image-alt%3D%22Updated%20Ninja%20Diagram.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F232956i2280A93EB1FAD6D8%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22Updated%20Ninja%20Diagram.png%22%20alt%3D%22Updated%20Ninja%20Diagram.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-1877343%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EAzure%20Advanced%20Threat%20Protection%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3ECloud%20Security%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3ECompliance%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EIdentity%20%26amp%3B%20Access%20Management%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EInformation%20Protection%20%26amp%3B%20Governance%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EMicrosoft%20Cloud%20App%20Security%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EMicrosoft%20Information%20Protection%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EMicrosoft%20Threat%20Protection%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3ESecurity%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EThreat%20Protection%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1925669%22%20slang%3D%22en-US%22%3ERe%3A%20The%20Microsoft%20Cloud%20App%20Security%20(MCAS)%20Ninja%20Training%20is%20Here!%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1925669%22%20slang%3D%22en-US%22%3E%3CP%3EThanks%20a%20lot%20for%20the%20resource%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F708110%22%20target%3D%22_blank%22%3E%40Sarahzin.%26nbsp%3B%3C%2FA%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E
Microsoft

Welcome to the MCAS Ninja Training!

Updated Ninja Diagram.png

 

 

Short links: http://aka.ms/MCASNinjaTraining and http://aka.ms/MCASNinja.

 

Have you been wanting to secure your cloud resources? Do you have agreements with non-Microsoft cloud applications? Do you want to share your cloud security knowledge and experience with others? Wait no longer, the Microsoft Cloud App Security (MCAS) Ninja training is here!

 

I am very pleased to introduce my MCAS Ninja training to you.  MCAS has hundreds of amazing videos out there and it can sometimes be overwhelming with determining where to start and how to progress through different levels. Over the last few months, I’ve gone through all these and created this repository of training materials in an ascending order… all in one central location! Please let me know what you think in the comments.

 

In terms of overall structuring, the training sessions are split into three different knowledge levels:

 

·       Beginner (Fundamentals)

·       Intermediate (Associate)

·       Advanced (Expert)

 

Module

Description

1.       Level 1: Beginner (Fundamentals)

Introduction to Microsoft Cloud App Security, licensing, portal navigation, policy basics, and overall definitions.

2.       Level 2: Intermediate (Associate)

Capability demos, automatic governance, overall deployment, and integrations.

3.       Level 3: Advanced (Expert)

Power automate, 3rd party IdP integration, and advanced use case scenarios.

 

In addition, after each module/level, there will be a knowledge check based on the training material you’d have just finished! Since there’s a lot of content, the goal of the knowledge checks is to help you determine if you were able to get some of the major key takeaways. Lastly, there’ll be a fun certificate issued at the end of the training: Disclaimer: This is not an official Microsoft certification and only acts as a way of recognizing your participation in this training content.

 

NOTE: This training will be updated on a quarterly basis to ensure you all have the latest and greatest material!

 

Let us know what you think!

 

P.S. I wanted to give my colleague, @DanEdwards, a huge kudos for helping me automate the certificate app and knowledge check! Thank you, Dan!

 

Legend/Acronyms

(D)

Microsoft Documentation

(V)

Video

(B)

Blog

MCAS

Microsoft Cloud App Security

RBAC

Role-based access control

MDATP

Microsoft Defender Advanced Threat Protection

AATP

Azure Advanced Threat Protection

ATP

Advanced Threat Protection

AIP

Azure Information Protection

ASC

Azure Security Center

AAD

Azure Active Directory

CASB

Cloud Access Security Broker

MTP

Microsoft Threat Protection

GCC

Government Community Cloud

GCC-H

Government Community Cloud High

 

Note: Threat protection product names from Microsoft are changing. Read more about this and other updates here. We'll be updating names in products and in the docs soon.

  • Microsoft 365 Defender (previously Microsoft Threat Protection)

  • Microsoft Defender for Endpoint (previously Microsoft Defender Advanced Threat Protection)

  • Microsoft Defender for Office 365 (previously Office 365 Advanced Threat Protection)

  • Microsoft Defender for Identity (previously Azure Advanced Threat Protection)

 

MCAS Ninja Training

 

Level: Beginner  (Fundamentals) (Video Introduction)

  1. Community Information
    1. MCAS Tech Community
      1. This is a Microsoft Cloud App Security (MCAS) Tech Community space that provides an opportunity to connect and discuss the latest news, updates, and best practices with Microsoft professionals and peers.
  2. Understanding CASBs
    1. Top 20 Use Cases for CASBs (D)
      1. This document provides use cases which can be leveraged as a starting point during a proof of concept (POC), or as you’re getting ready to deploy your CASB solution looking for ways to prioritize your deployment component.
    2. What is a CASB and Why Do I need one? (B)

      1. A blog detailing an overview of CASBs and why they're important for securing your cloud resources. 
  3. MCAS Best Practices (D)
    1. This article provides best practices for protecting your organization by using Microsoft Cloud App Security. These best practices come from our overall experience working with Cloud App Security and from the experiences from customers like you.
  4. MCAS Introduction
    1. MCAS Licensing (V)*subject to change*
      1. Questions on MCAS licensing? Contact your Microsoft reseller or Microsoft Partner.
      2. MCAS License Datasheet (D)
      3. Differences between MCAS and OCAS (D)
      4. Differences between MCAS and CAD (D)
    2. Microsoft Cloud App Security Introduction (V)
      1. This is an introductory video presentation of Microsoft's Cloud Access Security Broker (CASB): Microsoft Cloud App Security (MCAS).
  5. Initial Settings
    1. Configure IP Addresses (V)
      1. This video shows you how to add your organization's IP address ranges to remove complexities from policy creation, investigation, and improve the accuracy of your alerts.
      2. For more information, check out this article. (D)
    2. Import User Groups (V)
      1. This video shows you how to important user groups into MCAS to help create relevant policies.
      2. For more information, check out this article. (D)
    3. Configure Admin Roles (V)
      1. In this video, we show you how to configure admin roles and setup role-based access controls.
      2. For more information, check out this article. (D)
    4. Configure MSSP Access (V)
      1. The above video walks you through adding Managed Security Service Provider (MSSP) access to MCAS.
  6. Cloud Discovery
    1. Dashboard Basics (D)
      1. The above article gives an overview on how to work with MCAS daily while providing a few tips on how to navigate the portal.
    2. Discovered Apps (D)
      1. The above article provides guidance on how to work with discovered apps and the steps to take to dive deep into what the dashboard offers.
    3. App Risk Scoring (V)
      1. This video provides an overview on how MCAS evaluates the risk over discovered SaaS apps in your environment.
      2. For more information, check out this article. (D)
    4. MCAS App Connectors (V)
      1. This video provides a brief introduction on MCAS 3rd party SaaS connectors.
      2. For more information, check out this article. (D)
    5. Using the Cloud App Discovery Feature (V)
      1. This is a video overview of MCAS and its discovery functions.
  7. Information Protection and Real-time Controls
    1. Connect Office 365 (V)
      1. This video demonstrates how to connect Office 365 to Microsoft Cloud App Security and enable our powerful capabilities across DLP, Threat Protection, and more.
    2. Configure AAD with MCAS Conditional Access App Control (V)
      1. In this video, we walk you through how to configure real-time monitoring and control across your cloud apps leveraging our powerful, native integration with Azure AD Conditional Access.
    3. What is Conditional Access App Control? (V)
      1. In this video, we explore what Conditional Access App Control is, how to deploy and configure it, and testing of a scenario (Microsoft Teams).
    4. Block Sensitive Information Downloads (D)
      1. The above article walks you through a tutorial on how to create a session policy to block the download of sensitive information.
  8. Threat Detection
    1. Threat Detection Overview (V)
      1. The above video walks you through MCAS’s threat detection capabilities that allow you to identify advanced attackers and insider threats.
    2. User and Entity Behavior Analytics (V)
      1. This video provides a brief overview on User & Entity Behavior Analytics (UEBA) in MCAS.
    3. Discover and Mange risky OAuth applications (V)
      1. This video discusses how MCAS can help you identify when users authorize OAuth apps, detect risky apps, and revoke access to risky apps.

Level: Beginner (Fundamentals) Knowledge Check

 

Level: Intermediate (Associate) (Video Introduction

  1. Overview
    1. Microsoft Cloud App Security: Overview (V)
      1. This is an overview video discussing the different pillars and configuration steps for MCAS with a demo.
  2. Cloud Discovery
    1. Cloud Discovery Interactive Guide (V)
      1. This interactive guide walks you through discovering, protecting, and controlling your apps.
    2. Cloud Discovery Policies (D)
      1. The above article walks you through creating cloud discovery policies within your MCAS environment.
    3. MCAS and MDATP Integration (V)
      1. This video walks through the process of Integrating MDATP and MCAS and how simple the integration is—without requiring extra agents or proxies.
      2. For more information, check out this article. (D)
    4. Log Collector Configuration (V)
      1. An overview on using the log collector to enable cloud discovery and a walk-through on deployment.
      2. For guidance on log collector deployment, choose your deployment mode here and follow the accompanying steps. (D)
    5. Integrate with Zscaler (D)
      1. If you work with both Cloud App Security and Zscaler, you can integrate the two products to enhance your security Cloud Discovery experience.
    6. Integrate with iboss (D)
      1. If you work with both Cloud App Security and iboss, you can integrate the two products to enhance your security Cloud Discovery experience.
    7. Integrate with Corrata (D)
      1. If you work with both Cloud App Security and Corrata, you can integrate the two products to enhance your security Cloud Discovery experience for mobile app use.
  3. Information Protection and Real-Time Controls
    1. Connect Box, Salesforce, and GitHub to MCAS (B)

      1. This blog contains a short series of videos to help you with key points of integration.
    2. Secure and Connect Github (B)

      1. This blog walks through how to secure and connect your GitHub instance in MCAS.
    3. Protecting Storage Apps and Malware Detection (V)
      1. This video shows you how MCAS can help you protect your cloud storage apps and ensure that they are not infected with malware.
      2. For more information, please see this article. (D)
    4. Configuring a read-only mode for external users (V)
      1. This video walks you through one of the many use-cases focused on external users using Conditional Access App Control, our reverse proxy solution.
    5. Block unauthorized browsers form accessing corporate web apps (V)
      1. A video detailing the policy configuration required to block unauthorized browsers from accessing corporate web applications.
    6. Using Admin Quarantine to investigate files (D)
      1. The above article is a tutorial helping you use admin quarantine to protect your files.
    7. Automatically apply labels to your sensitive files (D)
      1. The above article is a tutorial walking you through applying a label to a sensitive file.
    8. Information Protection Policies (D)
      1. The above article walks you through creating information protection policies within your MCAS environment.
  4. Threat Detection
    1. Threat Policies (D)
      1. The above article walks you through creating threat protection policies within your MCAS environment.
    2. Azure Advanced Threat Protection Integration
      1. How Azure ATP integrates with MCAS (D)
      2. The above article is designed to help you understand and navigate the enhanced investigation experience in MCAS with Azure ATP.
    3. Detect Threats and Manage Alerts (V)
      1. The interactive guide above walks you through the steps of managing threats and alerts.
    4. Malware Hunting and Automatic Remediation (V)
      1. This video provides a brief overview of Malware Hunting in SaaS Apps using MCAS.

Level: Intermediate (Associate) Knowledge Check

 

Level: Advanced (Expert) (Video Introduction)

  1. Power Automate Blog Series (B)
    1. Triage Infrequent Country Alerts using Power Automate and MCAS  (V)
      1. A video walk- through on creating a new Power Automate Flow to automate the triage of Infrequent Country alerts in MCAS (Threat Protection Pillar).
    2. Request user validation to reduce your SOC workload  (V)
      1. A vide walk-through on using Power Automate Flow to request user validation for file sharing (Data Protection Pillar).
    3. Request for Manager Action (V)
      1. This video walks you through using Power Automate Flow to request manager validation for their team.
      2. Step-by-step guidance (B)
    4. Auto-disable malicious inbox rules using MCAS & Power Automate (V)
      1. This video walks you through a new Power Automate Flow on how to remove malicious inbox rules detected in your cloud environment.
  2. 3rd Party IdP Configuration 
    1. PingOne (D)
      1. This document walks you through integrating PingOne with MCAS for Conditional Access App Control using Salesforce as an example.
    2. ADFS (Coming soon!)
    3. Okta (Coming soon!)
  3. Conditional Access App Control steps for non-Microsoft SAAS applications
    1. Workplace for Facebook (V)
    2. Box (V)
    3. Slack (V)
  4. SIEM Integrations
    1. Connect Azure Sentinel (V)
      1. This video details how to connect Azure Sentinel (Microsoft's SIEM + SOAR product) to MCAS.
    2. Azure Sentinel Entities Enrichment (Users) (V)
      1. This video looks at how you can use the provided playbooks to enrich your impacted user profiles, and then consume it in Sentinel, ServiceNow, or Postman.
    3. Microsoft CAS Infrequent Country triage with Azure Sentinel and Logic Apps (V)
      1. This video walks you through the deployment of a playbook to using it to triage your Azure Sentinel incidents.
    4. Connect a 3rd Party SIEM (V)
      1. This video details how to connect a third party SIEM to MCAS.    
  5. Advanced Scenarios and Guidance
    1. Indicators of Compromise  (V)
      1. This video walks you through how to create custom Indicators of Compromise in MCAS.
    2. MCAS and Microsoft Threat Protection  (V)
      1. A video guide on how Microsoft is unifying our threat products.
    3. Block Apps/Sites on iOS (Defender for Endpoint + MCAS) (V)
      1. A video walk-through on how to block apps and sites on iOS using Defender for iOS and using custom indicators of compromise from the Microsoft Cloud App Security & Microsoft Defender for Endpoint integration.
    4. MCAS API Documentation (D)
      1. The above article describes how to interact with Cloud App Security over HTTPS.
    5. Configuring a Log Collector behind a Proxy (D)
      1. The above article walks you through further configuration to ensure your log collector works when behind a proxy.
  6. Additional Blogs and Series
    1. Ninja Training Blog Series (B)
      1. This blog series dives into partner specific topics (such as ideas for managed services, reporting dashboards, playbooks, and more) that you can use to help your clients be successful with Microsoft Cloud App Security.
    2. MCAS Data Protection Blog Series (B)
      1. This blog goes through different data protection scenarios based on questions the CxE team has received from customers.
    3. Securing Administrative Access to Microsoft Cloud App Security and Defender for Identities (B)
      1. This blog provides guidance on how to configure Azure AD Conditional Access to secure administrative access to Microsoft Cloud App Security (MCAS) and Defender for Identities (formerly Azure ATP).
    4. Limiting Inherited Roles from Azure Active Directory in MCAS (B)
      1. This blog goes over a customer scenario for MCAS and the steps that can be taken to meet their requirements on limiting inherited AAD roles’ accesses in MCAS.
  7. Important Announcements
    1. Unified Data Loss Prevention Post Announcement (B)
      1. This blog details all the latest and greatest information protection improvements including the new changes for MCAS.
    2. MCAS is removing non-secure cipher suites (B)
      1. This blog provides an update on the non-secure cipher suites no longer supported by MCAS and the steps to take to prepare for this change.
    3. Unified Labeling is now generally available in GCC and GCC-H environments (B)
      1. This blog provides an update that information protection is available in our government tenants.

Level: Advanced (Expert) Knowledge Check

 

Once you’ve finished the training and the knowledge checks, please go to our attestation portal to generate your certificate (you'll see it in your inbox within 3-5 business days (click here).

 

We have a great lineup of updates coming for the next rendition (next quarter). If you'd like anything covered, please comment below! In addition, please reach out to me directly if you have any content you'd like to include as well.

 

I hope you all enjoy this training!

4 Comments
Valued Contributor

Thank you @Sarahzin 

These are very valuable resources and as it has been said in video, it is good to have all resources in one place.

New Contributor

Note MCAS and MDATP Integration does not work & is not supported if your organisation uses proxies.  Wasted some time on this dead end :(
Hope in future MDATP can be used as data source to MCAS cloud app discovery when clients connect via proxies.

Microsoft

@AlexMags, the Microsoft Defender for Endpoint (former MDATP) sensor does support and work with various methods of proxied connections, as documented here. A challenging scenario though is when the network uses a forward proxy as a gateway to the Internet. This documentation might help you to monitor connections behind a forward proxy through network events that originate from network protection.

 

Occasional Visitor

Thanks a lot for the resource @Sarahzin.