<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>Microsoft Defender for Cloud Apps topics</title>
    <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/bd-p/MicrosoftDefenderCloudApps</link>
    <description>Microsoft Defender for Cloud Apps topics</description>
    <pubDate>Mon, 27 Apr 2026 21:32:03 GMT</pubDate>
    <dc:creator>MicrosoftDefenderCloudApps</dc:creator>
    <dc:date>2026-04-27T21:32:03Z</dc:date>
    <item>
      <title>MCAS logcollector docker image : 0 logs received</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/mcas-logcollector-docker-image-0-logs-received/m-p/4476932#M2790</link>
      <description>&lt;P&gt;I followed that documentation : &lt;A href="https://learn.microsoft.com/en-us/defender-cloud-apps/discovery-docker-ubuntu?tabs=ubuntu" target="_blank"&gt;Configure automatic log upload using on-premises Docker on Linux - Microsoft Defender for Cloud Apps | Microsoft Learn&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;My Collector is displaying a connected status in the console :&amp;nbsp;&lt;/P&gt;&lt;img /&gt;&lt;P&gt;But as you can see, no data was received, and if I do a collector_status -P on my docker :&amp;nbsp;&lt;/P&gt;&lt;img /&gt;&lt;P&gt;&lt;BR /&gt;I checked all possible logs files, nothing helped me&lt;BR /&gt;&lt;BR /&gt;So if someone can help about that..&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Thank you !&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 10 Dec 2025 17:19:11 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/mcas-logcollector-docker-image-0-logs-received/m-p/4476932#M2790</guid>
      <dc:creator>Lenshir</dc:creator>
      <dc:date>2025-12-10T17:19:11Z</dc:date>
    </item>
    <item>
      <title>Problem Automatic Log Upload - Defender for Cloud Apps</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/problem-automatic-log-upload-defender-for-cloud-apps/m-p/4451193#M2784</link>
      <description>&lt;P&gt;Hello Community,&lt;/P&gt;&lt;P&gt;I have a strange problem with the activity in the Title.&lt;/P&gt;&lt;P&gt;I have create Data Sources from Fortinet&lt;/P&gt;&lt;img /&gt;&lt;P&gt;And a Log collector&lt;/P&gt;&lt;img /&gt;&lt;P&gt;With the correct documentation that is linked &lt;A href="https://learn.microsoft.com/en-us/defender-cloud-apps/discovery-docker-ubuntu-azure?tabs=centos" target="_blank"&gt;Configure automatic log upload using Docker in Azure - Microsoft Defender for Cloud Apps | Microsoft Learn&lt;/A&gt;&lt;/P&gt;&lt;P&gt;So i have a Fortinet Firewall that send by SYSLOG log to the VM Ubuntu in Azure, i have deploy docker, Ubuntu receive log from firewall, i see traffic is correct.&lt;/P&gt;&lt;P&gt;But from Cloud Apps connector remains into "Connected" state.&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Guido&lt;/P&gt;</description>
      <pubDate>Fri, 05 Sep 2025 08:26:10 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/problem-automatic-log-upload-defender-for-cloud-apps/m-p/4451193#M2784</guid>
      <dc:creator>GuidoImpe</dc:creator>
      <dc:date>2025-09-05T08:26:10Z</dc:date>
    </item>
    <item>
      <title>Restricting access to non SSO apps</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/restricting-access-to-non-sso-apps/m-p/4442892#M2781</link>
      <description>&lt;P&gt;I have multiple non SSO apps that my users need to access. I am looking to permit access but limit what actions users can take when visiting these apps/sites such as:&amp;nbsp;blocking file uploads, blocking data download, restricting logins, etc to limit shadow IT.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there a way to do this within MDCA? Session control policies, activity policies and access policies require the apps be onboarded or SSO configured which is not feasible for the numerous apps in scope. If not MDCA, what other services have you used to accomplish this?&lt;/P&gt;</description>
      <pubDate>Wed, 13 Aug 2025 13:09:59 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/restricting-access-to-non-sso-apps/m-p/4442892#M2781</guid>
      <dc:creator>Derr1ck</dc:creator>
      <dc:date>2025-08-13T13:09:59Z</dc:date>
    </item>
    <item>
      <title>General Risk Factor - Logon URL - Null</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/general-risk-factor-logon-url-null/m-p/4426790#M2777</link>
      <description>&lt;P&gt;I'm trying to create a policy that maps "Logon URL" field in the app details and if its empty/blank, it approves/sanction the application. My only challenge is that I'm not able to set an identifier that reads blank field. I tried ASCII null character but it doesn't work. Wondering if this use case is even possible.&lt;/P&gt;</description>
      <pubDate>Tue, 24 Jun 2025 18:42:32 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/general-risk-factor-logon-url-null/m-p/4426790#M2777</guid>
      <dc:creator>RavTin</dc:creator>
      <dc:date>2025-06-24T18:42:32Z</dc:date>
    </item>
    <item>
      <title>Playbooks with MDCA</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/playbooks-with-mdca/m-p/4422732#M2773</link>
      <description>&lt;P&gt;I am attempting to integrate MDCA alerts with freshdesk as per the e.g. &lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/defender-cloud-apps/flow-integration" target="_blank"&gt;https://learn.microsoft.com/en-us/defender-cloud-apps/flow-integration&lt;/A&gt;&lt;/P&gt;&lt;P&gt;I have E5 without teams licenses.&lt;/P&gt;&lt;P&gt;I created the flow, Once from playbooks in MDCA portal and once in power automate directly and went to create a policy to test it out but the option "Sent to power automate" from the policy is always greyed out.&lt;/P&gt;&lt;P&gt;Alerts are not automatically detected in the flow unless the action in the policy is set to send to power automate which again is greyed as option in the policies.&lt;/P&gt;&lt;P&gt;Also playbooks tab in the MDCA portal does not show the flows I created before, It shows empty, Seems link is broken between MDCA and PowerAutomate.&lt;/P&gt;&lt;P&gt;Any reason for this, Any Idea about this? Thanks in advance.&lt;/P&gt;</description>
      <pubDate>Wed, 11 Jun 2025 08:43:55 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/playbooks-with-mdca/m-p/4422732#M2773</guid>
      <dc:creator>AhmedSHMK</dc:creator>
      <dc:date>2025-06-11T08:43:55Z</dc:date>
    </item>
    <item>
      <title>Problem with MDCA Session Control and Google Workspace</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/problem-with-mdca-session-control-and-google-workspace/m-p/4407134#M2768</link>
      <description>&lt;P&gt;We have implemented MDCA Session Control with Google Workspace in a Customer. Almost all Google apps work and they are protected by Session Control, but we have found problems with Gemini, Analytics and Google Search. These apps don´t open under session control and it seems some kind of problems with SSO. Do anyone knows any fix for the problem?&lt;/P&gt;</description>
      <pubDate>Wed, 23 Apr 2025 16:27:00 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/problem-with-mdca-session-control-and-google-workspace/m-p/4407134#M2768</guid>
      <dc:creator>Ramon_Pastor_Garcia</dc:creator>
      <dc:date>2025-04-23T16:27:00Z</dc:date>
    </item>
    <item>
      <title>Filter out BYOD devices from blocking unsanctioned apps</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/filter-out-byod-devices-from-blocking-unsanctioned-apps/m-p/4406076#M2767</link>
      <description>&lt;P&gt;Hi there,&lt;/P&gt;&lt;P&gt;I've encountered an issue. When I tag a cloud app as unsanctioned, it gets blocked as expected. However, we use BYOD mobile devices that are Entra registered along with app protection policies, and the unsanctioned apps are being blocked outside the managed apps. For example, an unsanctioned app gets blocked in unmanaged safari browser on BYOD iOS device. I can't find information on how to limit the enforcement scope to only managed apps on BYODs or how to limit the enforcement scope to company-managed devices. Please help.&lt;/P&gt;</description>
      <pubDate>Mon, 21 Apr 2025 02:42:51 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/filter-out-byod-devices-from-blocking-unsanctioned-apps/m-p/4406076#M2767</guid>
      <dc:creator>PavIT5</dc:creator>
      <dc:date>2025-04-21T02:42:51Z</dc:date>
    </item>
    <item>
      <title>Using Microsoft Defender for Cloud Apps to block apps on managed devices.</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/using-microsoft-defender-for-cloud-apps-to-block-apps-on-managed/m-p/4367150#M2750</link>
      <description>&lt;P&gt;Greetings,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have been tasked to work with Microsoft Defender for cloud apps and to block the usage of the Firefox browser on all endpoints within my estate apart from a few users who require it.&lt;/P&gt;&lt;P&gt;I have tried to unsanctioned app feature. This only displays a warning prompt but users can still proceed with using and interacting with the application.&lt;/P&gt;&lt;img /&gt;&lt;P&gt;We have already configured web content filtering and works fine. I already looked up other articles relating to downloading a block script but that applies to other security appliances such as firewalls which we don't want to get into.&lt;/P&gt;&lt;P&gt;Is there a convenient way to block certain apps usage by solely using Microsoft Defender for Cloud Apps or is this platform only used for monitoring purposes and cannot really block the app by unsanctioning it?&lt;/P&gt;</description>
      <pubDate>Thu, 16 Jan 2025 15:29:21 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/using-microsoft-defender-for-cloud-apps-to-block-apps-on-managed/m-p/4367150#M2750</guid>
      <dc:creator>CrestonV</dc:creator>
      <dc:date>2025-01-16T15:29:21Z</dc:date>
    </item>
    <item>
      <title>Cloud Discovery policy - Governance action - Scoped profile missing</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/cloud-discovery-policy-governance-action-scoped-profile-missing/m-p/4356400#M2749</link>
      <description>&lt;P&gt;Hi everyone,&amp;nbsp;&lt;/P&gt;&lt;P&gt;I wanted to create a Cloud Discovery policy that automatically tags as unsanctioned some applications but only for a scoped profiles.&lt;/P&gt;&lt;P&gt;When tagging cloud applications manually, it's possible to scope it to a profile:&lt;/P&gt;&lt;img /&gt;&lt;P&gt;However, this option doesn't exist in the governance actions section:&lt;/P&gt;&lt;img /&gt;&lt;P&gt;Are there any other way to create policies that can tag but only for a device group/scoped profile?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;</description>
      <pubDate>Wed, 11 Dec 2024 14:23:07 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/cloud-discovery-policy-governance-action-scoped-profile-missing/m-p/4356400#M2749</guid>
      <dc:creator>MatheoBt</dc:creator>
      <dc:date>2024-12-11T14:23:07Z</dc:date>
    </item>
    <item>
      <title>MCAS Log collector supported for Ubuntu 22.04 LTS and Ubuntu 24.04 LTS</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/mcas-log-collector-supported-for-ubuntu-22-04-lts-and-ubuntu-24/m-p/4338673#M2747</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;is collector supported for these 2 versions? In official documentation does not appear.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you!&lt;/P&gt;</description>
      <pubDate>Tue, 26 Nov 2024 15:57:51 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/mcas-log-collector-supported-for-ubuntu-22-04-lts-and-ubuntu-24/m-p/4338673#M2747</guid>
      <dc:creator>benjamino-21</dc:creator>
      <dc:date>2024-11-26T15:57:51Z</dc:date>
    </item>
    <item>
      <title>Block Sensitive Data Upload to External SharePoint Online Tenants</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/block-sensitive-data-upload-to-external-sharepoint-online/m-p/4287248#M2732</link>
      <description>&lt;P&gt;We need to block the ability of Users, who are serving the notice period, to upload any Confidential labelled documents to external SharePoint Online Tenants. What is the best way to do this please?&lt;/P&gt;</description>
      <pubDate>Wed, 06 Nov 2024 16:12:13 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/block-sensitive-data-upload-to-external-sharepoint-online/m-p/4287248#M2732</guid>
      <dc:creator>Sochito</dc:creator>
      <dc:date>2024-11-06T16:12:13Z</dc:date>
    </item>
    <item>
      <title>Teams  cloud app policy template not showing</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/teams-cloud-app-policy-template-not-showing/m-p/4284620#M2727</link>
      <description>&lt;P&gt;Below should be available since last year, but i dont see them in my list.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;UL&gt;&lt;LI&gt;Access level change (Teams): Alerts when a team's access level is changed from private to public.&lt;/LI&gt;&lt;LI&gt;External user added (Teams): Alerts when an external user is added to a team.&lt;/LI&gt;&lt;LI&gt;Mass deletion (Teams): Alerts when a user deletes a large number of teams&lt;/LI&gt;&lt;/UL&gt;&lt;/UL&gt;&lt;P&gt;We have the Microsoft 365 E5-security license. Do we need another license for that ?&lt;/P&gt;</description>
      <pubDate>Fri, 01 Nov 2024 14:33:29 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/teams-cloud-app-policy-template-not-showing/m-p/4284620#M2727</guid>
      <dc:creator>MichelA__</dc:creator>
      <dc:date>2024-11-01T14:33:29Z</dc:date>
    </item>
    <item>
      <title>MCAS Log on Event</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/mcas-log-on-event/m-p/4279434#M2724</link>
      <description>&lt;P&gt;Last night I had a Sentinel alert for logon from IP address associated with password spray. Alert was triggered from threat indicator matching IP address. OK no big deal, wasn't a password spray. In tracking this down I see the user is external in MCAS. I find no files shared with the user, no teams message activity, no email to the user.... nothing. My question is, what could the logon event be from?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;img /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 25 Oct 2024 13:14:31 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/mcas-log-on-event/m-p/4279434#M2724</guid>
      <dc:creator>JeffR_CNY</dc:creator>
      <dc:date>2024-10-25T13:14:31Z</dc:date>
    </item>
    <item>
      <title>MCAS requirements for Log Collector</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/mcas-requirements-for-log-collector/m-p/4279126#M2722</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;this is my first question in the Microsoft Community. I have been reviewing the requisites for MCAS log collector and I wanted to understand why does the machine hosting the log collector needs at least 250 GB disk, as this appliance sends every 40KB to MCAS and stores up to 20 backup files.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance,&lt;/P&gt;&lt;P&gt;Benjamin&lt;/P&gt;</description>
      <pubDate>Fri, 25 Oct 2024 06:38:53 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/mcas-requirements-for-log-collector/m-p/4279126#M2722</guid>
      <dc:creator>benjamino-21</dc:creator>
      <dc:date>2024-10-25T06:38:53Z</dc:date>
    </item>
    <item>
      <title>Admin Quarantine Location on Defender for Cloud Apps keeps going blank</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/admin-quarantine-location-on-defender-for-cloud-apps-keeps-going/m-p/4262962#M2719</link>
      <description>&lt;P&gt;Hi,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am facing an issue where when I select a file location for admin quarantine on Defender for Cloud Apps, that file path just vanishes away the next day and it comes up as a blank location. I tried changing the SharePoint site multiple times but it still goes blank after a day. Has anybody encountered this lately ?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;img /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 04 Oct 2024 18:13:34 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/admin-quarantine-location-on-defender-for-cloud-apps-keeps-going/m-p/4262962#M2719</guid>
      <dc:creator>AbhinavK1660</dc:creator>
      <dc:date>2024-10-04T18:13:34Z</dc:date>
    </item>
    <item>
      <title>Conditional access policy not recognised</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/conditional-access-policy-not-recognised/m-p/4260732#M2715</link>
      <description>&lt;P&gt;Hello everyone,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We're evaulating Cloud Apps session/conditional access/session policies but have hit a weird snag.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have created a conditional access policy in EntraID with session control of Use Conditional Access App Control. This was initially set to Monitor Only (Preview)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I then signed in with the test user and logged into the various 365 services, and confirmed these apps were onboarded into the Conditional Access App Control apps page.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So far so good. However when I've attempted to create either a Access or Session Policy in the Cloud Apps Policy Management section, there is an error saying that there are no conditional access policies set up.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;img /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I changed the conditional access policies in Entra ID to "Custom Policy" and waited a few hours, but still getting the error. I have created additional conditional access policies in EntraID from scratch and waited over night, but it still seems that EntraID and the Cloud Apps parts aren't talking with each other.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When I create a policy, I get a warning that there isn't a corresponding CA policy. The Access/Session policy is reated, but has [Entra ID Policy Missing] in the title.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;img /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm not sure where I'm going wrong with this. I've followed various guides and checked various forums but aside from the obvious I'm at a loss. Has anyone else come up against this before, or should I raise a ticket with MS to look at the back end?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance,&lt;/P&gt;&lt;P&gt;Mark&lt;/P&gt;</description>
      <pubDate>Wed, 02 Oct 2024 10:10:38 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/conditional-access-policy-not-recognised/m-p/4260732#M2715</guid>
      <dc:creator>HidMov</dc:creator>
      <dc:date>2024-10-02T10:10:38Z</dc:date>
    </item>
    <item>
      <title>New Blog | Introducing the new File Integrity Monitoring with Defender for Endpoint integration</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/new-blog-introducing-the-new-file-integrity-monitoring-with/m-p/4257198#M2713</link>
      <description>&lt;P&gt;By&amp;nbsp;&lt;A href="https://techcommunity.microsoft.com/t5/user/viewprofilepage/user-id/1244399" target="_blank"&gt;Gal Fenigshtein&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;As part of the Log Analytics agent deprecation, Defender for Servers has introduced a&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/microsoft-defender-for-cloud-strategy-and-plan-towards-log/ba-p/3883341" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;new simplification strategy&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;aiming at significantly simplifying the onboarding process and requirements needed to protect servers in the cloud, while enhancing existing capabilities and adding new ones.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:210,&amp;quot;335559739&amp;quot;:210,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;According to this strategy, all Defender for Servers capabilities are provided over Defender for Endpoint or cloud-native capabilities and agentless scanning for VMs, without relying on either Log Analytics Agent (MMA) or Azure Monitor Agent (AMA).&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:210,&amp;quot;335559739&amp;quot;:210,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;This hybrid approach combines the strengths of agent-based and agentless protection, offers multi-layered security for servers. While the agent provides in-depth security and real-time detection and response, agentless and cloud-native capabilities deliver enhanced coverage, full visibility within hours, with no performance impact on machines. Security findings from both, agent-based and agentless approaches, are seamlessly integrated in Defender for Cloud, tailored to protect servers in multicloud environments.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Read the full post here:&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/introducing-the-new-file-integrity-monitoring-with-defender-for/ba-p/4252051" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;Introducing the new File Integrity Monitoring with Defender for Endpoint integration&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;
&lt;DIV class="custom-subscription-widget"&gt;
&lt;DIV class="title-icon"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Fri, 27 Sep 2024 18:29:30 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/new-blog-introducing-the-new-file-integrity-monitoring-with/m-p/4257198#M2713</guid>
      <dc:creator>DavidFernandes</dc:creator>
      <dc:date>2024-09-27T18:29:30Z</dc:date>
    </item>
    <item>
      <title>block Unsanction app in cloud</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/block-unsanction-app-in-cloud/m-p/4254072#M2712</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Similar queries as previously mentioned from one of the User;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I'm just getting started with Microsoft Defender for Cloud Apps but have already worked a bit with it when it was still named Cloud App Security. Right now, I'm looking into the Cloud Discovery features. While trying out the Unsanctioned feature for some apps, I ran into the problem that they only get blocked if the user is using Microsoft Edge. If the user uses Chrome or Firefox, the app doesn't get blocked. I integrated MDCA with Microsoft Defender for Endpoint. What am I missing?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Does anyonce from Microsoft; kindly jump into and give guidance&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;thanks&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;palash&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Sep 2024 17:05:10 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/block-unsanction-app-in-cloud/m-p/4254072#M2712</guid>
      <dc:creator>Palash_Shukla</dc:creator>
      <dc:date>2024-09-24T17:05:10Z</dc:date>
    </item>
    <item>
      <title>Cloud Discovery Dashboard not updating</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/cloud-discovery-dashboard-not-updating/m-p/4244770#M2709</link>
      <description>&lt;P&gt;We successfully integrated the MDCA with Zscaler on 10th Sep 10 AM. From that Time until 11th Sep 9:08 PM, data was getting updated in the console but after that it is showing &lt;SPAN&gt;Updated on Sep 11, 2024, 9:08 PM.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Under Governance log - last parse Cloud discovery log shows success at&amp;nbsp;11/9/2024, 21:07:51. There is nothing in pending or failed state.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Automatic log upload (under settings) shows 362 uploaded logs, last data received 11 Sep 2024, Modified date 13 Sep 2024.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Please suggest why Dashboard is not updating.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 13 Sep 2024 15:20:27 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/cloud-discovery-dashboard-not-updating/m-p/4244770#M2709</guid>
      <dc:creator>Sochito</dc:creator>
      <dc:date>2024-09-13T15:20:27Z</dc:date>
    </item>
    <item>
      <title>Access Policies not blocking existing Office app connections</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/access-policies-not-blocking-existing-office-app-connections/m-p/4243049#M2708</link>
      <description>&lt;P&gt;I'm testing blocking the Office apps on unmanaged devices so users cannot use them to download sensitive data. While I have had success with preventing users from licensing their Office apps or setting up OneDrive syncing, unfortunately it isn't blocking apps that are already setup. So licensed Office apps can still browse to Sharepoint, and open a file, email is still delivered in Outlook and file changes in OneDrive still sync in both directions. I want to stop all existing connections in their tracks with this policy.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The Access policy is setup with the following:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Device not equal to Hybrid Entra Joined...&lt;/LI&gt;&lt;LI&gt;User account equal to mine&lt;/LI&gt;&lt;LI&gt;App equals Microsoft 365&lt;/LI&gt;&lt;LI&gt;Client app equals Mobile and desktop&lt;/LI&gt;&lt;LI&gt;Device equals PC&lt;/LI&gt;&lt;LI&gt;Block and display a customised message&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;I have a separate Session policy that is blocking cut,copy,print,&amp;amp; download activities in a web browser.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can anyone explain why it isnt working as I would expect?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for any help.&lt;/P&gt;</description>
      <pubDate>Thu, 12 Sep 2024 06:29:44 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/access-policies-not-blocking-existing-office-app-connections/m-p/4243049#M2708</guid>
      <dc:creator>Cameron_Stephens</dc:creator>
      <dc:date>2024-09-12T06:29:44Z</dc:date>
    </item>
  </channel>
</rss>

