Microsoft Defender for Cloud Apps Ninja Training | September 2021

Published Sep 30 2021 09:30 AM 11K Views
Microsoft

 

Have you been wanting to secure your cloud resources? Do you have agreements with non-Microsoft cloud applications? Do you want to share your cloud security knowledge and experience with others? Wait no longer, the Microsoft Defender for Cloud Apps Ninja training is here!

 

Short Links:  http://aka.ms/MCASNinjaTraining and http://aka.ms/MCASNinja.

 

Microsoft Defender for Cloud Apps has hundreds of amazing videos available and it can sometimes be overwhelming with determining where to start and how to progress through different levels. We've gone through all these and created this repository of training materials - all in one central location!  Please let us know what you think in the comments.

 

The overall structure of the training sessions are split into three main knowledge levels:

Level

Description

Level 1: Fundamentals - Beginner level

Introduction to Microsoft Defender for Cloud Apps, licensing, portal navigation, policy basics, and overall definitions.

Level 2: Intermediate - Associate level

Capability demos, automatic governance, overall deployment, and connecting 3rd party apps.

Level 3: Advanced - Expert level

Power automate, 3rd party IdP integration, and advanced use case scenarios.

 

After each level, we will offer you a knowledge check based on the training material you have just finished! Since there’s a lot of content, the goal of the knowledge checks is to help ensure understanding of the key concepts that were covered. Lastly, there’ll be a fun certificate issued at the end of the training! Disclaimer: This is not an official Microsoft certification and only acts as a way of recognizing your participation in this training content.

 

We plan to update this training on a quarterly basis to ensure that you all have the latest and the greatest training materials.  Please do check back often for new training content.  The newly added  training content will be tagged with "[New!]" at the end of the training title.  For those of you who have already gone through the training before, you can view  those [New!] training contents directly. 

 

Note: Threat protection product names from Microsoft have recently changed. Read more about this and other updates here
  • Microsoft 365 Defender (previously Microsoft Threat Protection)

  • Microsoft Defender for Endpoint (previously Microsoft Defender Advanced Threat Protection)

  • Microsoft Defender for Office 365 (previously Office 365 Advanced Threat Protection)

  • Microsoft Defender for Identity (previously Azure Advanced Threat Protection)

Please let us know what you think about this training!

 

Acronyms

Acronyms

Full Name

MCAS

Microsoft Cloud App Security

RBAC

Role-based access control

MDATP

Microsoft Defender Advanced Threat Protection

AATP

Azure Advanced Threat Protection

ATP

Advanced Threat Protection

AIP

Azure Information Protection

ASC

Azure Security Center

AAD

Azure Active Directory

CASB

Cloud Access Security Broker

MTP

Microsoft Threat Protection

GCC

Government Community Cloud

GCC-H

Government Community Cloud High

MDI

Microsoft Defender for Identity

MDO

Microsoft Defender for Office 365

MDE

Microsoft Defender for Endpoint

 

Table of Contents

 

Microsoft Defender for Cloud Apps - Fundamentals

Module 1. Fundamental level Overview 

Module 2. Microsoft Defender for Cloud Apps Introduction

Module 3. Initial Settings 

Module 4. Cloud Discovery 

Module 5. Information Protection and Real-Time Controls 

Module 6. Threat Detection 

Fundamentals Knowledge Check

 

Microsoft Defender for Cloud Apps - Intermediate

Module 1. Intermediate Level Overview 

Module 2. Cloud Discovery

Module 3. Information Protection and Real-Time Control

Module 4. Threat Detection

Intermediate Knowledge Check 

 

Microsoft Defender for Cloud Apps - Advanced

Module 1. Advanced Level Overview 

Module 2. Power Automate

Module 3. 3rd Party IdP configuration

Module 4. Conditional Access App Control steps for non-Microsoft SAAS applications

Module 5. SIEM Integration

Module 6. Advanced Scenarios and Guidance

Module 7, Additional Blogs and Information

Advanced Level Knowledge Check

 

Legend

CTang885_0-1631683617908.png  Docs on Microsoft CTang885_1-1631683617910.png Blogs on Microsoft
CTang885_2-1631683617982.png Product videos CTang885_3-1631683617947.pngWebcast recordings
CTang885_4-1631683617962.png Tech Community CTang885_5-1631683617963.pngCTang885_0-1631834559565.png Interactive guides

⤴ External Sites

CTang885_6-1631683617997.png  GitHub

 

Microsoft Defender for Cloud Apps - Fundamentals [Beginner Level]

 

Module 1. Fundamental Level Overview

Training Title Description
CTang885_2-1631683617982.png Introduction to Microsoft Defender for Cloud Apps Beginner Level Training This video provides a summary of what contents will be covered in the Fundamentals (Beginner level) training
CTang885_4-1631683617962.png Microsoft Defender for Cloud Apps Tech Community This is a Microsoft Defender for Cloud Apps Community space that allows users to connect and discuss the latest news, upgrades, and best practices with Microsoft professionals and peers.
CTang885_0-1631683617908.pngCTang885_0-1631691278723.png  Top 20 Use Cases for CASBs This document provides use cases that can be leveraged during proof of concept (POC), or as prep step for deploying CASB solution (looking for ways to prioritize deployment components). 
CTang885_0-1631687643554.png What is a CASB and Why do I need one? This blog provides an overview of CASBs and why they are important for securing your cloud resources. 

 

Module 2.  Microsoft Defender for Cloud Apps Introduction 

Training Title Description
CTang885_2-1631683617982.png  Microsoft Defender for Cloud Apps Introduction This is an introductory video presentation of Microsoft's Cloud Access Security Broker(CASB): Microsoft Defender for Cloud Apps
CTang885_1-1631688568327.png  Microsoft Defender for Cloud Apps Best Practices This article outlines the best practice for protecting your organization using Microsoft Defender for Cloud Apps. The Best Practice comes from our overall experience working with Cloud Security and from our customers, like you. 
CTang885_2-1631688701356.png Microsoft Defender for Cloud Apps User Interface Updates This blog provides an update on the Microsoft Defender for Cloud Apps UI changes.
CTang885_2-1631683617982.png  Microsoft Defender for Cloud Apps Licensing  This video provides an overview of Microsoft Defender for Cloud Apps licensing information
CTang885_1-1631688568327.png  Microsoft Defender for Cloud Apps Licensing Datasheet This document is the Microsoft Defender for Cloud Apps licensing datasheet mentioned in the MCAS Licensing video.
CTang885_1-1631688568327.png  Difference between Microsoft Defender for Cloud Apps and OCAS   This document outlines the differences between Microsoft Defender for Cloud Apps and OCAS
CTang885_1-1631688568327.png  Difference between Microsoft Defender for Cloud Apps and AAD Discovery This document outlines the differences in discovery capabilities  between Microsoft Defender for Cloud Apps and AAD
CTang885_2-1631683617982.png  TCO/ROI of Microsoft Defender for Cloud Apps (Forrester Study) This video goes over the result of a Forrester Study from May 2020 with the Total Cost of Ownership and Return on Investment of Microsoft Defender for Cloud Apps.
The Total Economic Impact of Microsoft Defender for Cloud Apps

This site provides an overview of the study,

 

Module 3.  Initial Settings

Training Title  Description
CTang885_0-1631734868063.png   Connect Apps to get visibility and protection  [New!] This article outlines the steps on connecting the applications to Microsoft Defender for Cloud Apps to enable greater visibility and control over the application. 

CTang885_2-1631683617982.png  Connecting apps to Microsoft Defender for Cloud Apps   [New!]

This video walks through how to connect applications to Microsoft Defender for Cloud Apps

CTang885_0-1631734868063.pngCTang885_2-1631688701356.png  Connect your favorite Apps to Microsoft Defender for Cloud Apps

This blog provides a brief video overview on how to connect GitHub, Salesforce, Box, and Slack, to Microsoft Defender for Cloud Apps.  These 4 videos are also listed below. 

CTang885_2-1631683617982.png   Connect GitHub to Microsoft Defender for Cloud Apps

In this video, we walk through how to connect GitHub to Microsoft Defender for Cloud Apps.

CTang885_2-1631683617982.png   Connect Salesforce to Microsoft Defender for Cloud Apps

In this video, we walk through how to connect Salesforce to Microsoft Defender for Cloud Apps.

CTang885_2-1631683617982.png   Connect Box to Microsoft Defender for Cloud Apps

In this video, we walk through connecting Box to Microsoft Defender for Cloud Apps.

CTang885_2-1631683617982.png   Connect Slack to Microsoft Defender for Cloud Apps

In this video, we walk through connecting Slack to Microsoft Defender for Cloud Apps.

CTang885_2-1631683617982.png   Configure IP Addresses

This video shows how to add your organization's IP address ranges to remove complexities from policy creation, investigation, and improve the accuracy of your alerts.

CTang885_2-1631688701356.pngCTang885_2-1631688701356.png CTang885_0-1631734868063.png  Working with IP ranges and tagsCTang885_2-1631688701356.png

This article outlines the steps on how to configure IP addresses and use IP ranges and tags. 

CTang885_2-1631683617982.png   Import User Groups

This video shows how to import user groups into Microsoft Defender for Cloud Apps to help create relevant policies.

CTang885_0-1631734868063.png   Importing user groups from connect apps

This article outlines the steps on how to import user groups from connected apps 

CTang885_2-1631683617982.png   Configure Admin Roles

In this video, we show you how to configure admin roles and set up role-based access controls.

CTang885_0-1631734868063.png   Manage Admin Access

This article describes how to manage admin access in Microsoft Defender for Cloud Apps.

CTang885_2-1631683617982.png   Configure MSSP Access

In this video, we walk through the steps on adding Managed Security Service Provider (MSSP) access to Microsoft Defender for Cloud Apps.

CTang885_2-1631683617982.png   Access Security configuration Assessments of Azure, AWS, and GCP in Microsoft Defender for Cloud App...

This video provides an overview of how to view security configuration information in Microsoft Defender for Cloud Apps for Azure, AWS, and GCP.

CTang885_0-1631734868063.png   Get Configuration overview

This article describes how to access the security configuration information for Azure, AWS, and GCP in Microsoft Defender for Cloud Apps.

 

Module 4.  Cloud Discovery

Training Title Description
CTang885_2-1631688701356.png  Introduction to Microsoft Defender for Cloud Apps Cloud Discovery This blog details how to get started in Cloud Discovery in Microsoft Defender for Cloud Apps.
CTang885_2-1631688701356.png  Dashboard Basics This article gives a basic overview of how to navigate and use the dashboard. 
CTang885_0-1631725316135.png   Discovered Apps This article provides guidance on working with the discovered apps and dives deeper into the information provided by the dashboard. 
CTang885_2-1631683617982.png   App Risk Scoring This video provides an overview of how Microsoft Defender for Cloud Apps evaluates the risk over discovered SaaS apps in your environment. 
CTang885_2-1631683617982.png   Using the Cloud App Discovery Feature This video provides an overview of Microsoft Defender for Cloud Apps' cloud apps discovery feature.

 

Module 5.  Information Protection and Real-Time Controls

Training Title Description
CTang885_2-1631683617982.png  Connect Office 365 This video demonstrates how to connect Office 365 to Microsoft Defender for Cloud Apps and enable our powerful capabilities across DLP, Threat Protection, and more.
CTang885_2-1631683617982.png  What is Conditional Access App Control? In this video, we explore what Conditional Access App Control is, how to deploy and configure it, and testing a scenario (Microsoft Teams). 
CTang885_2-1631683617982.png  Governance actions for non-O365 and Azure apps This video provides an overview of some of the governance actions that can be taken with Microsoft Defender for Cloud Apps.
CTang885_2-1631683617982.png  Configure AAD with Microsoft Defender for Cloud Apps Conditional Access App for Session Controls (Do... In this video, we walk through how to configure real-time monitoring and control across your cloud apps leveraging our powerful, native integration with Azure AD conditional Access to provide inline controls for your downloads.
CTang885_0-1631725316135.png  Block Sensitive Information Downloads This article walks you through a tutorial on how to create a session policy to block the download of sensitive information.
CTang885_2-1631683617982.png  Configure AAD with Microsoft Defender for Cloud Apps Conditional Access App for Session Controls (Up... In this video, we walk through how to configure real-time monitoring and control across your cloud apps leveraging our powerful, native integration with Azure AD conditional Access to provide inline controls for your uploads.
CTang885_2-1631688701356.png Understand Unified Labeling Migration   [New!] This blog explains what "Unified Labeling" is and how to use it in the migration scenario.

 

Module 6.  Threat Detection

Training Title Description
CTang885_2-1631683617982.png  Threat Detection Overview In this video, we walk through Microsoft Defender for Cloud Apps' detection capabilities that allow you to identify advanced attackers and insider threats.
CTang885_2-1631683617982.png  User and Entity Behavior Analytics This video provides a brief overview of User & Entity Analytics (UEBA) in Microsoft Defender for Cloud Apps.
CTang885_2-1631683617982.png  Discover and Manage Risky OAuth applications In this video, we explore how Microsoft Defender for Cloud Apps can help you identify when users authorized OAuth apps, detect risky apps, and evoke access to risky apps.
CTang885_0-1631725316135.png  How to investigate anomaly detection alerts   [New!] This article provides general information on alerts that are detected by Microsoft Defender for Cloud Apps, and practical guidance on what needs to be done for alert investigation and remediation.
CTang885_0-1631725316135.png  Manage OAuth apps - Working with the OAuth app page [New!] This article provides instructions on using Microsoft Defender for Cloud Apps to manage OAuth applications. 

CTang885_1-1631773341527.png Knowledge Check - Microsoft Defender for Cloud Apps Fundamentals   

 

 

 

Microsoft Defender for Cloud Apps - Intermediate [Associate Level]

 

Module 1. Intermediate Level Overview

Training Title Description
CTang885_2-1631683617982.png  Introduction to Microsoft Defender for Cloud Apps Intermediate Level Training This video provides a summary of what contents will be covered in the Intermediate (Associate level) training
CTang885_2-1631683617982.png  Microsoft Defender for Cloud Apps: Overview This is an overview video that discusses the different pillars and configuration steps for Microsoft Defender for Cloud Apps with demo.
CTang885_2-1631688701356.png  Secure Access for applications with Microsoft Defender for Cloud Apps [New!] This article walks through how to secure access for applications with Microsoft Defender for Cloud Apps.

 

Module 2. Cloud Discovery

Training Title Description
CTang885_0-1631834559565.png  Cloud Discovery Interactive Guide This interactive guide walks through discovering, protecting, and controlling your apps.
CTang885_0-1631725316135.png  Cloud Discovery Policies This article goes over on what are the cloud discovery policies within your Microsoft Defender for Cloud Apps environment.
CTang885_0-1631725316135.png  How to exclude entities from discovery data  [New!] This article provides you with instructions on excluding certain entities' data from being part of the Cloud Discovery data for reporting.
CTang885_0-1631725316135.png  Microsoft Defender for Cloud Apps and MDE integration This article walks through the process of integrating MDE (formerly MDATP) and Microsoft Defender for Cloud Apps and how simple the integration is - without requiring an extra agent or proxy.
CTang885_2-1631683617982.png  How to design and deploy a Log Collector for Microsoft Defender for Cloud Apps   This video details the Microsoft Defender for Cloud Apps cloud discovery pillar and how to deploy a log collector.
CTang885_0-1631725316135.png  Integrate with Zscaler If you work with both Microsoft Defender for Cloud Apps and Zscaler, you can integrate the two products to enhance your security Cloud Discovery experience. 
CTang885_0-1631725316135.png  Integrate with iboss If you work with both Microsoft Defender for Cloud Apps and iboss, you can integrate the two products to enhance your security Cloud Discovery experience. 
CTang885_0-1631725316135.png  Integrate with Corrata If you work with both Microsoft Defender for Cloud Apps and Corrata, you can integrate the two products to enhance your security Cloud Discovery experience. 
CTang885_0-1631725316135.png  Integrate with Menlo  If you work with both Microsoft Defender for Cloud Apps and Menlo, you can integrate the two products to enhance your security Cloud Discovery experience. 

 

 Module 3. Information Protection and Real-Time  Controls

Training Title Description
CTang885_0-1631743524020.png   Set up Document Fingerprinting in Microsoft Defender for Cloud Apps In this video, we walk through how to configure a file policy to detect document fingerprinting in your file repositories using Microsoft Defender for Cloud Apps.
CTang885_1-1631743558581.png   Document fingerprinting in Microsoft 365 Compliance In this video, we walk through how to set up policies to detect document fingerprinting using Microsoft 365.
CTang885_5-1631683617963.pngCTang885_2-1631743975895.png   Protect and Control Information with Microsoft Defender for Cloud Apps In this interactive guide, we walk through common scenarios where you can control your information with Microsoft Defender for Cloud Apps.
CTang885_2-1631688701356.png  Secure and Connect GitHub This blog walks through how to secure and connect your GitHub instance in Microsoft Defender for Cloud Apps.
CTang885_1-1631743558581.png  Protecting GitHub This video walks through how to protect your GitHub instance using Microsoft Defender for Cloud Apps.
CTang885_2-1631688701356.png Secure and Connect Box This blog walks through how to secure and connect your Box instance in Microsoft Defender for Cloud Apps.
CTang885_1-1631743558581.png  Protecting Box This video walks through how to protect your data in Box using Microsoft Defender for Cloud Apps.
CTang885_2-1631688701356.png Protect your Slack environment using Microsoft Defender for Cloud Apps  [New!] This blog walks through how to protect your Slack environment using Microsoft Defender for Cloud Apps.
CTang885_0-1631725316135.png  How Microsoft Defender for Cloud Apps helps protect your Slack Enterprise [New!} This article goes over the capabilities in Microsoft Defender for Cloud Apps that can protect the Slack Enterprise environment. 
CTang885_2-1631688701356.png Protect your AWS environment using Microsoft Defender for Cloud Apps [New!}   This blog walks through how to secure and connect your AWS instance in Microsoft Defender for Cloud Apps.
CTang885_1-1631743558581.png   Connect AWS for security auditing in Microsoft Defender for Cloud Apps This video walks through how to connect to AWS for security auditing in Microsoft Defender for Cloud Apps.
CTang885_1-1631743558581.png   Connect AWS for security configuration in Microsoft Defender for Cloud Apps This video walks through how to connect to AWS for security configuration in Microsoft Defender for Cloud Apps.
CTang885_1-1631743558581.png   Connect AWS for laaS protection in Microsoft Defender for Cloud Apps This video walks through how to connect to AWS for laaS protection in Microsoft Defender for Cloud Apps.
CTang885_0-1631725316135.png   How Microsoft Defender for Cloud Apps helps protect your oneLogin (Preview)  [New!]  This article provides information on how Microsoft Defender for Cloud Apps protects the One Login environment.
CTang885_0-1631725316135.png  How Microsoft Defender for Cloud Apps helps protect your Zendesk (Preview)         [New!]         This article provides information on how Microsoft Defender for Cloud Apps protects the Zendesk environment.
CTang885_0-1631725316135.png   Connect ServiceNow to Microsoft Defender for Cloud Apps (Preview)   [New!]  This article steps through how to connect Microsoft Defender for Cloud Apps to your existing ServiceNow account using the application's API.
CTang885_1-1631743558581.pngCTang885_1-1631743558581.png   Protecting Storage Apps and Malware Detection This video shows you how Microsoft Defender for Cloud Apps can help you protect your cloud storage apps and ensure that they are not infected with malware.
CTang885_0-1631725316135.png   Malware detection in Microsoft Defender for Cloud Apps This article explains how malware detection work in Microsoft Defender for Cloud Apps.
CTang885_1-1631743558581.pngCTang885_1-1631743558581.pngCTang885_0-1631748312424.png  Configuring a read-only mode for external users This video walks you through one of the many use-cases focused on external users using Conditional Access App Control - our reverse proxy solution.
CTang885_0-1631748312424.png  Block unauthorized browsers from accessing corporate web apps This video detailing the policy configuration required to block unauthorized browsers from accessing corporate web applications.
CTang885_0-1631725316135.png  Using Admin Quarantine to investigate files This article is a tutorial that walks through how to use admin quarantine to protect your files. 
CTang885_0-1631725316135.png  Automatically apply labels to your sensitive files This article is a tutorial that walks through applying labels to a sensitive file. 
CTang885_0-1631725316135.png  Information Protection Policies This article walks you through how to create information protection policies in Microsoft Defender for Cloud Apps
CTang885_2-1631688701356.png Microsoft Defender for Cloud Apps or MIP? This blog walks you through some of the top use cases and questions asked regarding when to use Microsoft Defender for Cloud Apps vs when to use MIP.
CTang885_0-1631748312424.png  AWS with AAD and Microsoft Defender for Cloud Apps In this video, we walk through the architecture used to configure AWS with AAD and use Microsoft Defender for Cloud Apps to apply additional protections.
CTang885_2-1631688701356.png Microsoft Defender for Cloud Apps:  How to protect AWS admins and Developers This blog shows you how to use Microsoft Defender for Cloud Apps to protect AWS Admins and Developers. 
CTang885_0-1631725316135.png  Azure Information Protection integration - How to integrate Azure information Protection with Micros...  [New!] This article steps through how to integrate Azure information Protection with Microsoft Defender for Cloud Apps.
CTang885_0-1631725316135.png   Recommended Microsoft Defender for Cloud Apps policies for SaaS apps - Microsoft 365 Enterprise - Of...  [New!]       This article provides the recommended Microsoft Defender for Cloud Apps policies to use for SaaS applications. 
CTang885_2-1631688701356.png  Microsoft Defender for Cloud Apps Data Protection Blog Series: Microsoft Defender for Cloud Apps DLP...  [New!]    This blog walks through how to configure DLP policies using Microsoft Defender for Cloud Apps.
CTang885_1-1631751626423.png  MCAS:  Top 5 Queries you need to save  [New!]    This blog shares our top five custom queries to save for the five use cases.

 

Module 4. Threat Detection

Training Title

 Description

CTang885_0-1631725316135.png  Threat Detection Policies

This article shows you how to create threat protection policies within your Microsoft Defender for Cloud Apps environment. 

CTang885_0-1631725316135.png  How Microsoft Defender for identity integrates with Microsoft Defender for Cloud Apps

This article is designed to help you understand and navigate the enhanced investigation experience in Microsoft Defender for Cloud Apps and MDL 

CTang885_0-1631748312424.png  Microsoft Defender for Identity Overview

This video provides an overview of MDI capability 
CTang885_1-1631836383855.png  Microsoft Defender for Identity Ninja Training  This blog provides information on where you learn more about Microsoft Defender for Identity

CTang885_0-1631834559565.png  Detect Threats and Microsoft Alerts

This interactive guide shows you the steps on how to manage threats in Microsoft Defender for Cloud Apps.

CTang885_0-1631748312424.png  Microsoft 365 Defender - Hunting with Microsoft Defender for Cloud Apps data [New!] 

This video steps you through how to use the advanced hunting capability to investigate incidence using Microsoft Defender for Cloud Apps

CTang885_1-1631773341527.pngKnowledge Check - Microsoft Defender for Cloud Apps Intermediate 

 

 

 

 

Microsoft Defender for Cloud Apps - Advanced [Expert Level]

 

Module 1. Advanced Level Overview

Training Title Description
 CTang885_0-1631748312424.png  Introduction to Microsoft Defender for Cloud Apps Advanced Level Training This video provides a summary of what contents will be covered in the Advanced (Expert level) training.
CTang885_1-1631836383855.png  Power Automate Blog Series: 

Auto-Triage Infrequent Country Alerts using Microsoft Defender for Cloud Apps & Power Automate

This blog is part of the Power Automate Blog Series.  This blog walks through how to auto-triage country alerts using Microsoft Defender for Cloud Apps and Power Automate.
CTang885_0-1631748312424.png  Triage Infrequent County Alerts using Power Automate and Microsoft Defender for Cloud Apps This video walks through creating a new Power Automate Flow to automate the triage of infrequent Country alerts in Microsoft Defender for Cloud Apps (Threat Protection Pillar).
CTang885_0-1631748312424.png  Request user validation to reduce your SOC workloads This video walks through how to use Power Automate Flow to request user validation for file sharing (Data Protection Pillar).
CTang885_0-1631748312424.png  Request for Manager Action using Power Automate & Microsoft Defender for Cloud Apps In this video, we walk through how to use Power Automate Flow to request manager validation for their team.
CTang885_1-1631836383855.png  Request for Manager Action : Step-by-step guidance This blog outlines the steps and guidance on using Power Automate Flow to request manager validation for their team.
CTang885_0-1631748312424.png  Auto-disable malicious inbox rules using Microsoft Defender for Cloud Apps & Power Automate This video walks you through a new Power Automate Flow on how to remove malicious inbox rules detected in your cloud environment. 

 

Module 2. Non-Microsoft Party IdP configuration

Training Title Description
CTang885_0-1631725316135.png  PingOne This article walks you through integrating PingOne with Microsoft Defender for Cloud Apps for Conditional Access App Control using Salesforce as an example.
CTang885_0-1631725316135.png  ADFS This article walks you through integrating ADFS with Microsoft Defender for Cloud Apps for Conditional Access App Control using Salesforce as an example.
CTang885_0-1631725316135.png  Okta This article walks you through integrating Okta with Microsoft Defender for Cloud Apps for Conditional Access App Control using Salesforce as an example.

 

Module 3. Conditional Access App Control Steps for non-Microsoft SAAS applications

Training Title Description
CTang885_0-1631748312424.png  Workplace for Facebook: Block/Apply DLP downloaded files in Workplace from Facebook with Microsoft D... This video steps through how to use Conditional Access App Control in Microsoft Defender for Cloud Apps for Workplace for Facebook.
CTang885_0-1631748312424.png  Box This video steps through how to use Conditional Access App Control in Microsoft Defender for Cloud Apps for Box.
CTang885_1-1631836383855.png  Microsoft Defender for Cloud Apps Data Protection Blog Series: Box Real-Time Protections This blog provides additional guidance on real-time protection for Box.
CTang885_0-1631748312424.png  Slack: Block chats with sensitive data using Microsoft Defender for Cloud Apps This video steps through how to block chats with sensitive data using Conditional Access APP Control in Microsoft Defender for Cloud Apps.

 

Module 4. SIEM integration

Training Title Description
CTang885_0-1631748312424.png  Connect Azure Sentinel This video details how to connect Azure Sentinel (Microsoft's SIEM + SOAR product) to Microsoft Defender for Cloud Apps.
CTang885_0-1631748312424.png  Azure Sentinel Entities Enrichment (Users) This video looks at how you can use the provided playbooks to enrich your impacted user profiles, and then consume it in Sentinel, ServiceNow, or Postman. 
CTang885_0-1631748312424.png  Microsoft Defender for Cloud Apps Infrequent Country triage with Microsoft Sentinel and Logic Apps This video walks you through the deployment of a playbook to use to triage your Microsoft Sentinel incidents.
CTang885_0-1631748312424.png  Connect a 3rd Party SIEM This video details how to connect to third-party SIEM to Microsoft Defender for Cloud Apps.

 

Module 5. Advanced Scenarios and Guidance

Training Title Description
CTang885_0-1631748312424.png  Indicators of Compromise This video walks you through how to create custom Indicators of Compromise in Microsoft Defender for Cloud Apps
CTang885_0-1631748312424.png  Microsoft Defender for Cloud Apps and Microsoft Threat Protection This video guides you on how Microsoft is unifying our threat products.
CTang885_0-1631748312424.png  Block Apps/Sites on iOS (Defender for Endpoint + Microsoft Defender for Cloud Apps) This video walks through blocking apps and sites on iOS, suing Defender for iOS, and using custom indicators of compromise from Microsoft Defender for Cloud Apps and Defender for Endpoint integration.
CTang885_0-1631725316135.png  Microsoft Defender for Cloud Apps API Documentation This article describes how to interact with Microsoft Defender for Cloud Apps over HTTPS.
CTang885_0-1631725316135.png  Configuring a Log Collector behind a Proxy This article provides more information on configurations to ensure your log collector works when behind a proxy.
CTang885_2-1631743975895.png  Automate Microsoft Defender for Cloud Apps Alerts with Power Automate This interactive guide walks through the steps needed to automate alert management using Power Automate
CTang885_1-1631836383855.png Microsoft Defender for Cloud Apps:  The Hunt in a multi-stage incident [New!]  This blog explains how to use Microsoft 365 Defender to address common alerts from Microsoft Defender for Cloud Apps to determine the threats' scope and impact. 
CTang885_0-1631725316135.png  Microsoft Defender for Cloud Apps: The Hunt for Insider Risk    [New!]   This blog outlines the use cases for using Microsoft 365 Defender to determine the "Insider Risk" alerts from Microsoft Defender for Cloud Apps.
CTang885_0-1631725316135.png  Proactively hunt for threats with advanced hunting in Microsoft 365 Defender [New!]       This article shows how to proactively hunt for threats using the Advance Hunting Tool in Microsoft 365 Defender.
CTang885_1-1631836383855.png  GitHub - Microsoft/Microsoft-365-Defender-Hunting-Queries: Sample queries for Advanced hunting in Mi...    [New!]    This blog provides a list of sample queries for Advance Hunting using Microsoft 365 Defender.

 

Module 6.  Additional Blogs and Information

Training Title Description

CTang885_1-1631836383855.png  Securing Administrative Access to Microsoft Defender for Cloud Apps and Defender for Identities

This blog provides guidance on how to configure Azure AD Conditional Access to secure administrative access to Microsoft Defender for Cloud Apps and Defender for Identity (Formerly Azure ATP)
CTang885_1-1631836383855.png  Limiting Inherited Roles from Azure Active Directory in Microsoft Defender for Cloud Apps This blog goes over a customer scenario for Microsoft Defender for Cloud Apps and the steps that can be taken to meet their requirements on limiting inherited AAD roles' accesses in Microsoft Defender for Cloud Apps
⤴   Microsoft Defender for Cloud Apps Learning Path Check out these learning paths for Microsoft Defender for Cloud Apps
CTang885_1-1631836383855.png  Lifecycle management strategy | Microsoft Docs This blog provides information on Microsoft Defender for Cloud Apps Lifecycle Management
CTang885_1-1631836383855.png  Bypass Blocking PDF Preview in OWA [New!] This blogs walks through use cases on using the "Real-Time Control" in Microsoft Defender for Cloud Apps to bypass blocking PDF previews in OWA.
CTang885_0-1631725316135.png  Tutorial:  Require step-up authentication (authentication context) upon risky actions   [New!] In this tutorial, we will show you how to protect your organization by requiring Azure AD Conditional Policies to be accessed during sensitive session actions using Microsoft Defender for Cloud Apps' Conditional Access Control.

 

CTang885_1-1631773341527.png Knowledge Check - Microsoft Defender for Cloud Apps Advanced

 

 

 

Once you've finished the training and the knowledge checks, please go to our attestation portal to generate your certificate -  you'll see it in your inbox within 3 to 5 business days (Click Here).  

 

We have a great lineup of updates for the next rendition (next quarter).  If you'd like anything covered, please comment below.  In addition, please reach out to us if you have any content that you would like to include as well. 

 

We hope you all enjoy this training! 

 

Feedback

Let us know if you have any feedback or relevant use cases/requirements for this portion of Microsoft Defender for Cloud Apps by emailing, CASFeedback@microsoft.com and mention the core area of concern.

 

Learn More

For further information on how your organization can benefit from Microsoft Defender for Cloud Apps, connect with us at the links below:  

Join the conversation on Tech Community.   

Stay up to date—subscribe to our  blog.   

Upload a log file from your network firewall or enable logging via Microsoft Defender for Endpoint to discover Shadow IT in your network.  

Learn more—download Top 20 use cases for CASB.  

Connect your cloud apps to detect suspicious user activity and exposed sensitive data.  

Search documentation on Microsoft Defender for Cloud Apps.   

Enable out-of-the-box anomaly detection policies and start detecting cloud threats in your environment.  

Understand your licensing options .   

Continue with more advanced use cases across information protection, compliance, and more.  

Follow the Microsoft Defender for Cloud Apps Ninja blog and learn about Ninja Training.   

Go deeper with these interactive guides:  

·         Discover and manage cloud app usage with Microsoft Defender for Cloud Apps  

·         Protect and control information with Microsoft Defender for Cloud Apps

·         Detect threats and manage alerts with Microsoft Defender for Cloud Apps

·         Automate alerts management with Microsoft Power Automate and Microsoft Defender for Cloud Apps

 

 

To experience the benefits of full-featured CASB, sign up for a  free trial—Microsoft Defender for Cloud Apps. 

 

Follow us on LinkedIn as #CloudAppSecurity. To learn more about Microsoft Security solutions, visit our website. Bookmark the Security blog to keep up with our expert coverage on security matters. Also, follow us at @MSFTSecurity on Twitter, and Microsoft 

 

3 Comments
%3CLINGO-SUB%20id%3D%22lingo-sub-2800492%22%20slang%3D%22en-US%22%3ERe%3A%20Microsoft%20Cloud%20App%20Security%20(MCAS)%20Ninja%20Training%20%7C%20September%202021%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2800492%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F1125330%22%20target%3D%22_blank%22%3E%40CTang885%3C%2FA%3E%26nbsp%3BI%20already%20earned%20this%20back%20in%20January%2C%20what%20is%20new%3F%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2816466%22%20slang%3D%22en-US%22%3ERe%3A%20Microsoft%20Cloud%20App%20Security%20(MCAS)%20Ninja%20Training%20%7C%20September%202021%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2816466%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F1125330%22%20target%3D%22_blank%22%3E%40CTang885%3C%2FA%3E%26nbsp%3Bcould%20you%20please%20adjust%20the%20formatting%20of%20the%20tables%20in%20Module%203%20above%20so%20that%20there%20is%20not%20so%20much%20white%20space.%20It%20causes%20excessive%20scrolling%20and%20does%20not%20use%20the%20screen%20spaces%20efficiently%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2820232%22%20slang%3D%22en-US%22%3ERe%3A%20Microsoft%20Cloud%20App%20Security%20(MCAS)%20Ninja%20Training%20%7C%20September%202021%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2820232%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F1096%22%20target%3D%22_blank%22%3E%40Dean%20Gross%3C%2FA%3E%26nbsp%3B%3A%20Thanks%20for%20your%20comments.%26nbsp%3B%20There%20were%20few%20new%20training%20contents%20added%20in%20this%20blog%20post.%26nbsp%3B%20These%20new%20trainings%20are%20tagged%20with%20the%20%22%3CFONT%20color%3D%22%23800080%22%3E%3CEM%3E%3CSTRONG%3E%5BNEW!%5D%3C%2FSTRONG%3E%3C%2FEM%3E%3C%2FFONT%3E%22%20at%20the%20end%20of%20their%20training%20title.%26nbsp%3B%20you%20should%20be%20able%20to%20spot%20them%20easily.%26nbsp%3B%20Since%20you%20have%20completed%20the%20training%20in%20January%2C%20you%20can%20view%20these%26nbsp%3B%3CFONT%20color%3D%22%23800080%22%3E%3CEM%3E%3CSTRONG%3E%5BNEW!%5D%3C%2FSTRONG%3E%3C%2FEM%3E%3C%2FFONT%3E%26nbsp%3Btrainings%20directly.%26nbsp%3B%20%26nbsp%3BAs%20for%20the%20table%20format%20for%20Module%203%2C%26nbsp%3B%20I%20apologize%20some%20cells%20in%20this%20table%20got%20stretched%20out%20and%20took%20lots%20of%20space.%26nbsp%3B%20However%2C%20the%20blog's%20table%20editing%20function%20seems%20to%20automatically%20stretch%20out%20the%20cells%20when%20the%20table%20contains%20more%20than%208%20lines%20of%20contents.%26nbsp%3B%20I%20have%20tried%20re-do%20this%20table%20many%20times%2C%20and%20it%20still%20does%20the%20same%20thing.%26nbsp%3B%20Never%20the%20less%2C%20I%20will%20continue%20to%20look%20for%20solution%20to%20fix%20this.%26nbsp%3B%20Thanks%20again%20for%20bring%20this%20to%20my%20attention.%26nbsp%3B%20%3A)%3C%2Fimg%3E%26nbsp%3B%20%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2751518%22%20slang%3D%22en-US%22%3EMicrosoft%20Defender%20for%20Cloud%20Apps%20Ninja%20Training%20%7C%20September%202021%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2751518%22%20slang%3D%22en-US%22%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%3EHave%20you%20been%20wanting%20to%20secure%20your%20cloud%20resources%3F%20Do%20you%20have%20agreements%20with%20non-Microsoft%20cloud%20applications%3F%20Do%20you%20want%20to%20share%20your%20cloud%20security%20knowledge%20and%20experience%20with%20others%3F%20Wait%20no%20longer%2C%20the%20Microsoft%20Defender%20for%20Cloud%20Apps%20Ninja%20training%20is%20here!%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%3CSTRONG%3EShort%20Links%3A%26nbsp%3B%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttp%253A%252F%252Faka.ms%252FMCASNinjaTraining%26amp%3Bdata%3D04%257C01%257CSarahzin.Chowdhury%2540microsoft.com%257Cba7fd479eba44af4960108d8872cab17%257C72f988bf86f141af91ab2d7cd011db47%257C1%257C0%257C637407973220527927%257CUnknown%257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%253D%257C1000%26amp%3Bsdata%3DRZPSVNDT7KJKPM8ZeWJOM79RNWZ%252B%252FmIwj0twuBWdRtU%253D%26amp%3Breserved%3D0%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3Ehttp%3A%2F%2Faka.ms%2FMCASNinjaTraining%3C%2FA%3E%26nbsp%3Band%26nbsp%3B%3CA%20href%3D%22http%3A%2F%2Faka.ms%2FMCASNinja%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%22%3Ehttp%3A%2F%2Faka.ms%2FMCASNinja.%3C%2FA%3E%3C%2FSTRONG%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%20has%20hundreds%20of%20amazing%20videos%20available%26nbsp%3Band%20it%20can%20sometimes%20be%20overwhelming%20with%20determining%20where%20to%20start%20and%20how%20to%20progress%20through%20different%20levels.%20We've%20gone%20through%20all%20these%20and%20created%20this%20repository%20of%20training%20materials%20-%26nbsp%3B%3C%2FSPAN%3Eall%20in%20one%20central%20location!%26nbsp%3B%20Please%20let%20us%20know%20what%20you%20think%20in%20the%20comments.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20overall%20structure%20of%20the%20training%20sessions%20are%20split%20into%20three%20main%20knowledge%20levels%3A%3C%2FP%3E%0A%3CTABLE%20width%3D%22624px%22%3E%0A%3CTBODY%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22310.516px%22%3E%3CSTRONG%3ELevel%3C%2FSTRONG%3E%3C%2FTD%3E%0A%3CTD%20width%3D%22312.484px%22%3E%3CP%3E%3CSTRONG%3EDescription%3C%2FSTRONG%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22310.516px%22%3E%3CP%3E%3CSTRONG%3ELevel%201%3A%20Fundamentals%20-%26nbsp%3B%3C%2FSTRONG%3EBeginner%20level%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22312.484px%22%3E%3CP%3EIntroduction%20to%20%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E%2C%20licensing%2C%20portal%20navigation%2C%20policy%20basics%2C%20and%20overall%20definitions.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22310.516px%22%3E%3CP%3E%3CSTRONG%3ELevel%202%3A%3C%2FSTRONG%3E%20%3CSTRONG%3EIntermediate%20-%20%3C%2FSTRONG%3EAssociate%20level%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22312.484px%22%3E%3CP%3ECapability%20demos%2C%20automatic%20governance%2C%20overall%20deployment%2C%20and%20connecting%203rd%20party%20apps.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22310.516px%22%3E%3CP%3E%3CSTRONG%3ELevel%203%3A%20Advanced%3C%2FSTRONG%3E%20-%20Expert%20level%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22312.484px%22%3E%3CP%3EPower%20automate%2C%203rd%20party%20IdP%20integration%2C%20and%20advanced%20use%20case%20scenarios.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3C%2FTBODY%3E%0A%3C%2FTABLE%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%3EAfter%20each%20level%2C%20we%20will%20offer%20you%20a%26nbsp%3B%3C%2FSPAN%3E%3CSTRONG%3Eknowledge%20check%26nbsp%3B%3C%2FSTRONG%3E%3CSPAN%3Ebased%20on%20the%20training%20material%20you%20have%20just%20finished!%20Since%20there%E2%80%99s%20a%20lot%20of%20content%2C%20the%20goal%20of%20the%20knowledge%20checks%20is%20to%20help%20ensure%20understanding%20of%20the%20key%20concepts%20that%20were%20covered.%20Lastly%2C%20there%E2%80%99ll%20be%20a%20fun%26nbsp%3B%3C%2FSPAN%3E%3CSTRONG%3Ecertificate%3C%2FSTRONG%3E%3CSPAN%3E%26nbsp%3Bissued%20at%20the%20end%20of%20the%20training!%26nbsp%3B%3CSTRONG%3EDisclaimer%3A%26nbsp%3B%3C%2FSTRONG%3E%3C%2FSPAN%3E%3CSTRONG%3EThis%20is%20not%20an%20official%20Microsoft%20certification%20and%20only%20acts%20as%20a%20way%20of%20recognizing%20your%20participation%20in%20this%20training%20content.%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWe%20plan%20to%20update%20this%20training%20on%20a%20quarterly%20basis%20to%20ensure%20that%20you%20all%20have%20the%20latest%20and%20the%20greatest%20training%20materials.%26nbsp%3B%20Please%20do%20check%20back%20often%20for%20new%20training%20content.%26nbsp%3B%20The%20newly%20added%26nbsp%3B%20training%20content%20will%20be%20tagged%20with%20%22%3CFONT%20color%3D%22%23800080%22%3E%3CSTRONG%3E%3CEM%3E%5BNew!%5D%3C%2FEM%3E%3C%2FSTRONG%3E%3C%2FFONT%3E%22%20at%20the%20end%20of%20the%20training%20title.%26nbsp%3B%20For%20those%20of%20you%20who%20have%20already%20gone%20through%20the%20training%20before%2C%20you%20can%20view%26nbsp%3B%20those%26nbsp%3B%3CFONT%20color%3D%22%23800080%22%3E%3CSTRONG%3E%3CEM%3E%5BNew!%5D%26nbsp%3B%3C%2FEM%3E%3C%2FSTRONG%3E%3CFONT%20color%3D%22%23000000%22%3Etraining%20contents%20directly.%26nbsp%3B%3C%2FFONT%3E%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CDIV%20class%3D%22MessageSubject%22%3E%3CSTRONG%3E%3CFONT%20color%3D%22%23000000%22%3ENote%3A%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3EThreat%20protection%20product%20names%20from%20Microsoft%20have%20recently%20changed.%20Read%20more%20about%20this%20and%20other%20updates%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F%3Fp%3D91813%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ehere%3C%2FA%3E.%26nbsp%3B%3C%2FFONT%3E%3C%2FSTRONG%3E%3C%2FDIV%3E%0A%3CDIV%20class%3D%22lia-message-body-content%22%3E%0A%3CUL%3E%0A%3CLI%3E%3CP%3E%3CFONT%20color%3D%22%23000000%22%3EMicrosoft%20365%20Defender%20(previously%20Microsoft%20Threat%20Protection)%3C%2FFONT%3E%3C%2FP%3E%0A%3C%2FLI%3E%0A%3CLI%3E%3CP%3E%3CFONT%20color%3D%22%23000000%22%3EMicrosoft%20Defender%20for%20Endpoint%20(previously%20Microsoft%20Defender%20Advanced%20Threat%20Protection)%3C%2FFONT%3E%3C%2FP%3E%0A%3C%2FLI%3E%0A%3CLI%3E%3CP%3E%3CFONT%20color%3D%22%23000000%22%3EMicrosoft%20Defender%20for%20Office%20365%20(previously%20Office%20365%20Advanced%20Threat%20Protection)%3C%2FFONT%3E%3C%2FP%3E%0A%3C%2FLI%3E%0A%3CLI%3E%3CP%3E%3CFONT%20color%3D%22%23000000%22%3EMicrosoft%20Defender%20for%20Identity%20(previously%20Azure%20Advanced%20Threat%20Protection)%3C%2FFONT%3E%3C%2FP%3E%0A%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%3CFONT%20color%3D%22%23000000%22%3EPlease%20let%20us%20know%20what%20you%20think%20about%20this%20training!%3C%2FFONT%3E%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId--352535557%22%20id%3D%22toc-hId--348599145%22%3E%26nbsp%3B%3C%2FH2%3E%0A%3CH2%20id%3D%22toc-hId-2134977276%22%20id%3D%22toc-hId-2138913688%22%3EAcronyms%3C%2FH2%3E%0A%3CTABLE%20width%3D%22623px%22%3E%0A%3CTBODY%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22309.931px%22%20height%3D%2229px%22%3E%3CSTRONG%3EAcronyms%3C%2FSTRONG%3E%3C%2FTD%3E%0A%3CTD%20width%3D%22311.944px%22%20height%3D%2229px%22%3E%3CP%3E%3CSTRONG%3EFull%20Name%3C%2FSTRONG%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22309.931px%22%20height%3D%2229px%22%3E%3CP%3EMCAS%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22311.944px%22%20height%3D%2229px%22%3E%3CP%3EMicrosoft%20Cloud%20App%20Security%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22309.931px%22%20height%3D%2229px%22%3E%3CP%3ERBAC%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22311.944px%22%20height%3D%2229px%22%3E%3CP%3ERole-based%20access%20control%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22309.931px%22%20height%3D%2256px%22%3E%3CP%3EMDATP%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22311.944px%22%20height%3D%2256px%22%3E%3CP%3EMicrosoft%20Defender%20Advanced%20Threat%20Protection%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22309.931px%22%20height%3D%2229px%22%3E%3CP%3EAATP%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22311.944px%22%20height%3D%2229px%22%3E%3CP%3EAzure%20Advanced%20Threat%20Protection%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22309.931px%22%20height%3D%2229px%22%3E%3CP%3EATP%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22311.944px%22%20height%3D%2229px%22%3E%3CP%3EAdvanced%20Threat%20Protection%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22309.931px%22%20height%3D%2229px%22%3E%3CP%3EAIP%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22311.944px%22%20height%3D%2229px%22%3E%3CP%3EAzure%20Information%20Protection%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22309.931px%22%20height%3D%2229px%22%3E%3CP%3EASC%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22311.944px%22%20height%3D%2229px%22%3E%3CP%3EAzure%20Security%20Center%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22309.931px%22%20height%3D%2229px%22%3E%3CP%3EAAD%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22311.944px%22%20height%3D%2229px%22%3E%3CP%3EAzure%20Active%20Directory%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22309.931px%22%20height%3D%2229px%22%3E%3CP%3ECASB%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22311.944px%22%20height%3D%2229px%22%3E%3CP%3ECloud%20Access%20Security%20Broker%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22309.931px%22%20height%3D%2229px%22%3E%3CP%3EMTP%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22311.944px%22%20height%3D%2229px%22%3E%3CP%3EMicrosoft%20Threat%20Protection%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22309.931px%22%20height%3D%2229px%22%3E%3CP%3EGCC%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22311.944px%22%20height%3D%2229px%22%3E%3CP%3EGovernment%20Community%20Cloud%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22309.931px%22%20height%3D%2229px%22%3E%3CP%3EGCC-H%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22311.944px%22%20height%3D%2229px%22%3E%3CP%3EGovernment%20Community%20Cloud%20High%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22309.931px%22%20height%3D%2229px%22%3E%3CP%3E%3CFONT%20color%3D%22%23000000%22%3EMDI%3C%2FFONT%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22311.944px%22%20height%3D%2229px%22%3E%3CP%3E%3CFONT%20color%3D%22%23000000%22%3EMicrosoft%20Defender%20for%20Identity%3C%2FFONT%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22309.931px%22%20height%3D%2229px%22%3E%3CP%3E%3CFONT%20color%3D%22%23000000%22%3EMDO%3C%2FFONT%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22311.944px%22%20height%3D%2229px%22%3E%3CP%3E%3CFONT%20color%3D%22%23000000%22%3EMicrosoft%20Defender%20for%20Office%20365%3C%2FFONT%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22309.931px%22%20height%3D%2229px%22%3E%3CP%3E%3CFONT%20color%3D%22%23000000%22%3EMDE%3C%2FFONT%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22311.944px%22%20height%3D%2229px%22%3E%3CP%3E%3CFONT%20color%3D%22%23000000%22%3EMicrosoft%20Defender%20for%20Endpoint%3C%2FFONT%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3C%2FTBODY%3E%0A%3C%2FTABLE%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId-327522813%22%20id%3D%22toc-hId-331459225%22%3ETable%20of%20Contents%3C%2FH2%3E%0A%3CH3%20id%3D%22toc-hId-1018084287%22%20id%3D%22toc-hId-1022020699%22%3E%26nbsp%3B%3C%2FH3%3E%0A%3CH3%20id%3D%22toc-hId--789370176%22%20id%3D%22toc-hId--785433764%22%3E%3CSTRONG%3E%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E%20-%20Fundamentals%3C%2FSTRONG%3E%3C%2FH3%3E%0A%3CP%3EModule%201.%20Fundamental%20level%20Overview%26nbsp%3B%3C%2FP%3E%0A%3CP%3EModule%202.%20%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E%20Introduction%3C%2FP%3E%0A%3CP%3EModule%203.%20Initial%20Settings%26nbsp%3B%3C%2FP%3E%0A%3CP%3EModule%204.%20Cloud%20Discovery%26nbsp%3B%3C%2FP%3E%0A%3CP%3EModule%205.%20Information%20Protection%20and%20Real-Time%20Controls%26nbsp%3B%3C%2FP%3E%0A%3CP%3EModule%206.%20Threat%20Detection%26nbsp%3B%3C%2FP%3E%0A%3CP%3EFundamentals%20Knowledge%20Check%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH3%20id%3D%22toc-hId-1698142657%22%20id%3D%22toc-hId-1702079069%22%3E%3CSTRONG%3E%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E%20-%20Intermediate%3C%2FSTRONG%3E%3C%2FH3%3E%0A%3CP%3EModule%201.%20Intermediate%20Level%20Overview%26nbsp%3B%3C%2FP%3E%0A%3CP%3EModule%202.%20Cloud%20Discovery%3C%2FP%3E%0A%3CP%3EModule%203.%20Information%20Protection%20and%20Real-Time%20Control%3C%2FP%3E%0A%3CP%3EModule%204.%20Threat%20Detection%3C%2FP%3E%0A%3CP%3EIntermediate%20Knowledge%20Check%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH3%20id%3D%22toc-hId--109311806%22%20id%3D%22toc-hId--105375394%22%3E%3CSTRONG%3E%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E%20-%20Advanced%3C%2FSTRONG%3E%3C%2FH3%3E%0A%3CP%3EModule%201.%20Advanced%20Level%20Overview%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20style%3D%22font-family%3A%20inherit%3B%22%3EModule%202.%20Power%20Automate%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%20style%3D%22font-family%3A%20inherit%3B%22%3EModule%203.%203rd%20Party%20IdP%20configuration%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%20style%3D%22font-family%3A%20inherit%3B%22%3EModule%204.%20Conditional%20Access%20App%20Control%20steps%20for%20non-Microsoft%20SAAS%20applications%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%20style%3D%22font-family%3A%20inherit%3B%22%3EModule%205.%20SIEM%20Integration%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%20style%3D%22font-family%3A%20inherit%3B%22%3EModule%206.%20Advanced%20Scenarios%20and%20Guidance%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%20style%3D%22font-family%3A%20inherit%3B%22%3EModule%207%2C%20Additional%20Blogs%20and%20Information%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%20style%3D%22font-family%3A%20inherit%3B%22%3EAdvanced%20Level%20Knowledge%20Check%3C%2FSPAN%3E%3C%2FP%3E%0A%3C%2FDIV%3E%0A%3CH2%20id%3D%22toc-hId--119814910%22%20id%3D%22toc-hId--115878498%22%3E%26nbsp%3B%3C%2FH2%3E%0A%3CH2%20id%3D%22toc-hId--1927269373%22%20id%3D%22toc-hId--1923332961%22%3ELegend%3C%2FH2%3E%0A%3CTABLE%20class%3D%22lia-align-left%22%20border%3D%221%22%20width%3D%22500%22%3E%0A%3CTBODY%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22236px%22%20height%3D%2238px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_0-1631683617908.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310487iBF9F99DF484C61F9%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_0-1631683617908.png%22%20alt%3D%22CTang885_0-1631683617908.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%26nbsp%3B%3CSPAN%20style%3D%22font-size%3A%20medium%3B%20font-family%3A%20inherit%3B%20background-color%3A%20transparent%3B%22%3EDocs%20on%20Microsoft%3C%2FSPAN%3E%3C%2FTD%3E%0A%3CTD%20width%3D%22263px%22%20height%3D%2238px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_1-1631683617910.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310488i11D5EC897BDADF3E%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_1-1631683617910.png%22%20alt%3D%22CTang885_1-1631683617910.png%22%20%2F%3E%3C%2FSPAN%3E%3CSPAN%20style%3D%22font-size%3A%20medium%3B%20background-color%3A%20transparent%3B%22%3E%26nbsp%3BBlogs%20on%20Microsoft%3C%2FSPAN%3E%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22236px%22%20height%3D%2230px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_2-1631683617982.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310489i016B8CE51018C6CD%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_2-1631683617982.png%22%20alt%3D%22CTang885_2-1631683617982.png%22%20%2F%3E%3C%2FSPAN%3E%3CSPAN%20style%3D%22font-size%3A%20medium%3B%20font-family%3A%20inherit%3B%20background-color%3A%20transparent%3B%22%3E%26nbsp%3BProduct%20videos%3C%2FSPAN%3E%3C%2FTD%3E%0A%3CTD%20width%3D%22263px%22%20height%3D%2230px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-left%22%20image-alt%3D%22CTang885_3-1631683617947.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310490iF41D2E1D7E16C923%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_3-1631683617947.png%22%20alt%3D%22CTang885_3-1631683617947.png%22%20%2F%3E%3C%2FSPAN%3E%3CFONT%20size%3D%223%22%20style%3D%22background-color%3A%20transparent%3B%22%3EWebcast%20recordings%3C%2FFONT%3E%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22236px%22%20height%3D%2234px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_4-1631683617962.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310491i29646BA2DEA8C489%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_4-1631683617962.png%22%20alt%3D%22CTang885_4-1631683617962.png%22%20%2F%3E%3C%2FSPAN%3E%3CSPAN%20style%3D%22font-size%3A%20medium%3B%20font-family%3A%20inherit%3B%20background-color%3A%20transparent%3B%22%3E%26nbsp%3B%3C%2FSPAN%3E%3CFONT%20size%3D%223%22%3E%3CSPAN%20style%3D%22font-size%3A%20medium%3B%20font-family%3A%20inherit%3B%20background-color%3A%20transparent%3B%22%3ETech%20Community%3C%2FSPAN%3E%3C%2FFONT%3E%3C%2FTD%3E%0A%3CTD%20width%3D%22263px%22%20height%3D%2234px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_5-1631683617963.png%22%20style%3D%22width%3A%200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310492i241B86E53ED8898F%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20width%3D%220%22%20height%3D%220%22%20role%3D%22button%22%20title%3D%22CTang885_5-1631683617963.png%22%20alt%3D%22CTang885_5-1631683617963.png%22%20%2F%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_0-1631834559565.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310901i124DDE2742CC7C6E%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_0-1631834559565.png%22%20alt%3D%22CTang885_0-1631834559565.png%22%20%2F%3E%3C%2FSPAN%3E%3CSPAN%20style%3D%22font-size%3A%20medium%3B%20background-color%3A%20transparent%3B%22%3E%26nbsp%3BInteractive%20guides%3C%2FSPAN%3E%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22236px%22%20height%3D%2236px%22%3E%3CP%3E%3CFONT%20size%3D%223%22%3E%E2%A4%B4%20External%20Sites%3C%2FFONT%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22263px%22%20height%3D%2236px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_6-1631683617997.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310493iAC3056A49E2BF2FD%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_6-1631683617997.png%22%20alt%3D%22CTang885_6-1631683617997.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%26nbsp%3B%3CSPAN%20style%3D%22font-size%3A%20medium%3B%20font-family%3A%20inherit%3B%20background-color%3A%20transparent%3B%22%3EGitHub%3C%2FSPAN%3E%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3C%2FTBODY%3E%0A%3C%2FTABLE%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId--521362834%22%20data-unlink%3D%22true%22%20id%3D%22toc-hId-560243460%22%20id%3D%22toc-hId-564179872%22%3E%3CSTRONG%3E%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E%20-%20Fundamentals%20%5BBeginner%20Level%5D%3C%2FSTRONG%3E%3C%2FH2%3E%0A%3CH3%20id%3D%22toc-hId-555641455%22%20id%3D%22toc-hId-559577867%22%3E%26nbsp%3B%3C%2FH3%3E%0A%3CH3%20id%3D%22toc-hId--1251813008%22%20id%3D%22toc-hId--1247876596%22%3E%3CSTRONG%3EModule%201.%20Fundamental%20Level%20Overview%3C%2FSTRONG%3E%3C%2FH3%3E%0A%3CTABLE%20border%3D%221%22%20width%3D%22100%25%22%3E%0A%3CTBODY%3E%0A%3CTR%3E%0A%3CTD%20height%3D%2229px%22%3E%3CSTRONG%3ETraining%20Title%3C%2FSTRONG%3E%3C%2FTD%3E%0A%3CTD%20height%3D%2229px%22%3E%3CSTRONG%3EDescription%3C%2FSTRONG%3E%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2256px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_2-1631683617982.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310489i016B8CE51018C6CD%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_2-1631683617982.png%22%20alt%3D%22CTang885_2-1631683617982.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%3CA%20href%3D%22http%3A%2F%2Faka.ms%2Fbeginnervideo%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EIntroduction%20to%20%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E%20Beginner%20Level%20Training%3C%2FA%3E%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2256px%22%3EThis%20video%20provides%20a%20summary%20of%20what%20contents%20will%20be%20covered%20in%20the%20Fundamentals%20(Beginner%20level)%20training%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2283px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_4-1631683617962.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310491i29646BA2DEA8C489%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_4-1631683617962.png%22%20alt%3D%22CTang885_4-1631683617962.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-cloud-app-security%2Fbd-p%2FMicrosoftCloudAppSecurity%22%20target%3D%22_blank%22%3EMicrosoft%20Defender%20for%20Cloud%20Apps%20Tech%20Community%3C%2FA%3E%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2283px%22%3EThis%20is%20a%20%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E%20Community%20space%20that%20allows%20users%20to%20connect%20and%20discuss%20the%20latest%20news%2C%20upgrades%2C%20and%20best%20practices%20with%20Microsoft%20professionals%20and%20peers.%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2229px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_0-1631683617908.png%22%20style%3D%22width%3A%200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310487iBF9F99DF484C61F9%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20width%3D%220%22%20height%3D%220%22%20role%3D%22button%22%20title%3D%22CTang885_0-1631683617908.png%22%20alt%3D%22CTang885_0-1631683617908.png%22%20%2F%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_0-1631691278723.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310507i7AFD55EC4B355FFE%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_0-1631691278723.png%22%20alt%3D%22CTang885_0-1631691278723.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fquery.prod.cms.rt.microsoft.com%2Fcms%2Fapi%2Fam%2Fbinary%2FRE3nibJ%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3E%26nbsp%3BTop%2020%20Use%20Cases%20for%20CASBs%3C%2FA%3E%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2229px%22%3EThis%20document%20provides%20use%20cases%20that%20can%20be%20leveraged%20during%20proof%20of%20concept%20(POC)%2C%20or%20as%20prep%20step%20for%20deploying%20CASB%20solution%20(looking%20for%20ways%20to%20prioritize%20deployment%20components).%26nbsp%3B%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2229px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_0-1631687643554.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310501i753B96E3BD56EFC1%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_0-1631687643554.png%22%20alt%3D%22CTang885_0-1631687643554.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-security-and%2Fmcas-ninja-what-s-a-casb-and-why-do-i-need-one%2Fba-p%2F1896575%3F_lrsc%3De428950e-de5e-45ff-b25f-b04fdb069bb8%22%20target%3D%22_blank%22%3EWhat%20is%20a%20CASB%20and%20Why%20do%20I%20need%20one%3F%3C%2FA%3E%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2229px%22%3EThis%20blog%20provides%20an%20overview%20of%20CASBs%20and%20why%20they%20are%20important%20for%20securing%20your%20cloud%20resources.%26nbsp%3B%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3C%2FTBODY%3E%0A%3C%2FTABLE%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH3%20id%3D%22toc-hId-1235699825%22%20id%3D%22toc-hId-1239636237%22%3E%3CSTRONG%3EModule%202.%26nbsp%3B%20%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E%20Introduction%3C%2FSTRONG%3E%26nbsp%3B%3C%2FH3%3E%0A%3CTABLE%20border%3D%221%22%20width%3D%22100%25%22%3E%0A%3CTBODY%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2229px%22%3E%3CSTRONG%3ETraining%20Title%3C%2FSTRONG%3E%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2229px%22%3E%3CSTRONG%3EDescription%3C%2FSTRONG%3E%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2283px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_2-1631683617982.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310489i016B8CE51018C6CD%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_2-1631683617982.png%22%20alt%3D%22CTang885_2-1631683617982.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%20%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DfM3_0P8MFUo%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EMicrosoft%20Defender%20for%20Cloud%20Apps%20Introduction%3C%2FA%3E%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2283px%22%3EThis%20is%20an%20introductory%20video%20presentation%20of%20Microsoft's%20Cloud%20Access%20Security%20Broker(CASB)%3A%20%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%22109px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_1-1631688568327.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310503iA462AA32A70C8423%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_1-1631688568327.png%22%20alt%3D%22CTang885_1-1631688568327.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fcloud-app-security%2Fbest-practices%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EMicrosoft%20Defender%20for%20Cloud%20Apps%20Best%20Practices%3C%2FA%3E%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%22109px%22%3EThis%20article%20outlines%20the%20best%20practice%20for%20protecting%20your%20organization%20using%20%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E.%20The%20Best%20Practice%20comes%20from%20our%20overall%20experience%20working%20with%20Cloud%20Security%20and%20from%20our%20customers%2C%20like%20you.%26nbsp%3B%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2229px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_2-1631688701356.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310504i0B7E984E60691F62%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_2-1631688701356.png%22%20alt%3D%22CTang885_2-1631688701356.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-security-and%2Fmicrosoft-cloud-app-security-user-interface-updates%2Fba-p%2F2083113%22%20target%3D%22_blank%22%3EMicrosoft%20Defender%20for%20Cloud%20Apps%20User%20Interface%20Updates%3C%2FA%3E%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2229px%22%3EThis%20blog%20provides%20an%20update%20on%20the%20%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E%20UI%20changes.%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2229px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_2-1631683617982.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310489i016B8CE51018C6CD%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_2-1631683617982.png%22%20alt%3D%22CTang885_2-1631683617982.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%20%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DdUcaksuW8ao%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EMicrosoft%20Defender%20for%20Cloud%20Apps%20Licensing%3C%2FA%3E%26nbsp%3B%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2229px%22%3EThis%20video%20provides%20an%20overview%20of%26nbsp%3B%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E%20licensing%20information%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2256px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_1-1631688568327.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310503iA462AA32A70C8423%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_1-1631688568327.png%22%20alt%3D%22CTang885_1-1631688568327.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%20%3CA%20href%3D%22https%3A%2F%2Fquery.prod.cms.rt.microsoft.com%2Fcms%2Fapi%2Fam%2Fbinary%2FRE2NXYO%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EMicrosoft%20Defender%20for%20Cloud%20Apps%20Licensing%20Datasheet%3C%2FA%3E%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2256px%22%3EThis%20document%20is%20the%20%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E%26nbsp%3Blicensing%20datasheet%20mentioned%20in%20the%20MCAS%20Licensing%20video.%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20height%3D%2229px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_1-1631688568327.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310503iA462AA32A70C8423%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_1-1631688568327.png%22%20alt%3D%22CTang885_1-1631688568327.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fcloud-app-security%2Feditions-cloud-app-security-o365%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EDifference%20between%20Microsoft%20Defender%20for%20Cloud%20Apps%20and%20OCAS%26nbsp%3B%26nbsp%3B%3C%2FA%3E%3C%2FTD%3E%0A%3CTD%20height%3D%2229px%22%3EThis%20document%20outlines%20the%20differences%20between%20%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E%20and%20OCAS%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20height%3D%2256px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_1-1631688568327.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310503iA462AA32A70C8423%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_1-1631688568327.png%22%20alt%3D%22CTang885_1-1631688568327.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fcloud-app-security%2Feditions-cloud-app-security-aad%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EDifference%20between%20Microsoft%20Defender%20for%20Cloud%20Apps%20and%20AAD%20Discovery%3C%2FA%3E%3C%2FTD%3E%0A%3CTD%20height%3D%2256px%22%3EThis%20document%20outlines%20the%20differences%20in%20discovery%20capabilities%26nbsp%3B%20between%20%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E%20and%20AAD%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20height%3D%2283px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_2-1631683617982.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310489i016B8CE51018C6CD%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_2-1631683617982.png%22%20alt%3D%22CTang885_2-1631683617982.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%20%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3F_lrsc%3D8654bd92-8a16-4e76-8078-708dadef0d5f%26amp%3Bv%3DYwwa45qayHo%26amp%3Bfeature%3Dyoutu.be%22%20target%3D%22_self%22%20rel%3D%22nofollow%20noopener%20noreferrer%22%3ETCO%2FROI%20of%20Microsoft%20Defender%20for%20Cloud%20Apps%20(Forrester%20Study)%3C%2FA%3E%3C%2FTD%3E%0A%3CTD%20height%3D%2283px%22%3EThis%20video%20goes%20over%20the%20result%20of%20a%20Forrester%20Study%20from%20May%202020%20with%20the%20Total%20Cost%20of%20Ownership%20and%20Return%20on%20Investment%20of%20%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E.%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20height%3D%2229px%22%3E%3CFONT%20size%3D%223%22%3E%E2%A4%B4%20%3C%2FFONT%3E%3CA%20href%3D%22https%3A%2F%2Ftools.totaleconomicimpact.com%2Fgo%2Fmicrosoft%2FCloudAppSecurity%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EThe%20Total%20Economic%20Impact%20of%20Microsoft%20Defender%20for%20Cloud%20Apps%3C%2FA%3E%3C%2FTD%3E%0A%3CTD%20height%3D%2229px%22%3E%3CP%3EThis%20site%20provides%20an%20overview%20of%20the%20study%2C%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3C%2FTBODY%3E%0A%3C%2FTABLE%3E%0A%3CH3%20id%3D%22toc-hId--571754638%22%20id%3D%22toc-hId--567818226%22%3E%26nbsp%3B%3C%2FH3%3E%0A%3CH3%20id%3D%22toc-hId-1915758195%22%20id%3D%22toc-hId-1919694607%22%3E%3CSTRONG%3EModule%203.%26nbsp%3B%20Initial%20Settings%3C%2FSTRONG%3E%3C%2FH3%3E%0A%3CTABLE%20border%3D%221%22%20width%3D%22100%25%22%3E%0A%3CTBODY%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2230px%22%3E%3CSTRONG%3ETraining%20Title%3C%2FSTRONG%3E%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2230px%22%3E%26nbsp%3B%3CSTRONG%3EDescription%3C%2FSTRONG%3E%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%22235px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_0-1631734868063.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310673iE13E137AA2A68B08%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_0-1631734868063.png%22%20alt%3D%22CTang885_0-1631734868063.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%20%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fcloud-app-security%2Fenable-instant-visibility-protection-and-governance-actions-for-your-apps%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EConnect%20Apps%20to%20get%20visibility%20and%20protection%3C%2FA%3E%26nbsp%3B%26nbsp%3B%3CSPAN%20style%3D%22font-family%3A%20inherit%3B%20background-color%3A%20transparent%3B%22%3E%3CFONT%20size%3D%222%22%20color%3D%22%23800080%22%3E%3CSTRONG%3E%5B%3C%2FSTRONG%3E%3CEM%3E%3CSTRONG%3ENew!%5D%3C%2FSTRONG%3E%3C%2FEM%3E%3C%2FFONT%3E%3C%2FSPAN%3E%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%22235px%22%3EThis%20article%20outlines%20the%20steps%20on%20connecting%20the%20applications%20to%20%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E%20to%20enable%20greater%20visibility%20and%20control%20over%20the%20application.%26nbsp%3B%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%22235px%22%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_2-1631683617982.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310489i016B8CE51018C6CD%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_2-1631683617982.png%22%20alt%3D%22CTang885_2-1631683617982.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%3CSPAN%20style%3D%22font-family%3A%20inherit%3B%20background-color%3A%20transparent%3B%22%3E%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DA10oxaxSj_Q%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EConnecting%20apps%20to%20Microsoft%20Defender%20for%20Cloud%20Apps%3C%2FA%3E%26nbsp%3B%20%26nbsp%3B%3CFONT%20size%3D%222%22%20color%3D%22%23800080%22%3E%3CSTRONG%3E%5B%3C%2FSTRONG%3E%3CEM%3E%3CSTRONG%3ENew!%5D%3C%2FSTRONG%3E%3C%2FEM%3E%3C%2FFONT%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%22235px%22%3EThis%20video%20walks%20through%20how%20to%20connect%20applications%20to%20%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E.%26nbsp%3B%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%22209px%22%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_0-1631734868063.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310673iE13E137AA2A68B08%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_0-1631734868063.png%22%20alt%3D%22CTang885_0-1631734868063.png%22%20%2F%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_2-1631688701356.png%22%20style%3D%22width%3A%200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310504i0B7E984E60691F62%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20width%3D%220%22%20height%3D%220%22%20role%3D%22button%22%20title%3D%22CTang885_2-1631688701356.png%22%20alt%3D%22CTang885_2-1631688701356.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fsecurity-compliance-and-identity%2Fconnect-your-favorite-apps-to-microsoft-cloud-app-security%2Fba-p%2F1835829%22%20target%3D%22_blank%22%3EConnect%20your%20favorite%20Apps%20to%20Microsoft%20Defender%20for%20Cloud%20Apps%3C%2FA%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%22209px%22%3EThis%20blog%20provides%20a%20brief%20video%20overview%20on%20how%20to%20connect%20GitHub%2C%20Salesforce%2C%20Box%2C%20and%20Slack%2C%20to%20%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E.%26nbsp%3B%20These%204%20videos%20are%20also%20listed%20below.%26nbsp%3B%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%22209px%22%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_2-1631683617982.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310489i016B8CE51018C6CD%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_2-1631683617982.png%22%20alt%3D%22CTang885_2-1631683617982.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%20%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DLYI5QxxP8C8%26amp%3Bfeature%3Demb_imp_woyt%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EConnect%20GitHub%20to%20Microsoft%20Defender%20for%20Cloud%20Apps%3C%2FA%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%22209px%22%3EIn%20this%20video%2C%20we%20walk%20through%20how%20to%20connect%20GitHub%20to%20%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E.%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%22209px%22%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_2-1631683617982.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310489i016B8CE51018C6CD%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_2-1631683617982.png%22%20alt%3D%22CTang885_2-1631683617982.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%20%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DSvjRFeITn9E%26amp%3Bfeature%3Demb_imp_woyt%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EConnect%20Salesforce%20to%20Microsoft%20Defender%20for%20Cloud%20Apps%3C%2FA%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%22209px%22%3EIn%20this%20video%2C%20we%20walk%20through%20how%20to%20connect%20Salesforce%20to%20%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E.%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%22209px%22%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_2-1631683617982.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310489i016B8CE51018C6CD%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_2-1631683617982.png%22%20alt%3D%22CTang885_2-1631683617982.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%26nbsp%3B%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DXQubblL4Viw%26amp%3Bfeature%3Demb_imp_woyt%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EConnect%20Box%20to%20Microsoft%20Defender%20for%20Cloud%20Apps%3C%2FA%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%22209px%22%3EIn%20this%20video%2C%20we%20walk%20through%20connecting%20Box%20to%20%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E.%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%22209px%22%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_2-1631683617982.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310489i016B8CE51018C6CD%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_2-1631683617982.png%22%20alt%3D%22CTang885_2-1631683617982.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%20%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fyoutu.be%2FxcaYYTrI8m4%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EConnect%20Slack%20to%20Microsoft%20Defender%20for%20Cloud%20Apps%3C%2FA%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%22209px%22%3EIn%20this%20video%2C%20we%20walk%20through%20connecting%20Slack%20to%20%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E.%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%22209px%22%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_2-1631683617982.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310489i016B8CE51018C6CD%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_2-1631683617982.png%22%20alt%3D%22CTang885_2-1631683617982.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%20%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DMbKp4XQTS9A%26amp%3Blist%3DPLXPr7gfUMmKxS1SYNgDaQY-9Q6cOqFxvG%26amp%3Bindex%3D4%26amp%3Bt%3D0s%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3E%3CSPAN%20style%3D%22font-family%3A%20inherit%3B%20background-color%3A%20transparent%3B%22%3EConfigure%20IP%20Addresses%3C%2FSPAN%3E%3C%2FA%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%22209px%22%3EThis%20video%20shows%20how%20to%20add%20your%20organization's%20IP%20address%20ranges%20to%20remove%20complexities%20from%20policy%20creation%2C%20investigation%2C%20and%20improve%20the%20accuracy%20of%20your%20alerts.%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%22209px%22%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_2-1631688701356.png%22%20style%3D%22width%3A%200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310504i0B7E984E60691F62%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20width%3D%220%22%20height%3D%220%22%20role%3D%22button%22%20title%3D%22CTang885_2-1631688701356.png%22%20alt%3D%22CTang885_2-1631688701356.png%22%20%2F%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_2-1631688701356.png%22%20style%3D%22width%3A%200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310504i0B7E984E60691F62%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20width%3D%220%22%20height%3D%220%22%20role%3D%22button%22%20title%3D%22CTang885_2-1631688701356.png%22%20alt%3D%22CTang885_2-1631688701356.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_0-1631734868063.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310673iE13E137AA2A68B08%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_0-1631734868063.png%22%20alt%3D%22CTang885_0-1631734868063.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fcloud-app-security%2Fip-tags%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EWorking%20with%20IP%20ranges%20and%20tags%3C%2FA%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_2-1631688701356.png%22%20style%3D%22width%3A%200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310504i0B7E984E60691F62%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20width%3D%220%22%20height%3D%220%22%20role%3D%22button%22%20title%3D%22CTang885_2-1631688701356.png%22%20alt%3D%22CTang885_2-1631688701356.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%22209px%22%3EThis%20article%20outlines%20the%20steps%20on%20how%20to%20configure%20IP%20addresses%20and%20use%20IP%20ranges%20and%20tags.%26nbsp%3B%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%22209px%22%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_2-1631683617982.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310489i016B8CE51018C6CD%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_2-1631683617982.png%22%20alt%3D%22CTang885_2-1631683617982.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%20%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DvdPr6dXeVfo%26amp%3Blist%3DPLXPr7gfUMmKxS1SYNgDaQY-9Q6cOqFxvG%26amp%3Bindex%3D5%26amp%3Bt%3D0s%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EImport%20User%20Groups%3C%2FA%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%22209px%22%3EThis%20video%20shows%20how%20to%20import%20user%20groups%20into%20%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E%20to%20help%20create%20relevant%20policies.%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%22236px%22%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_0-1631734868063.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310673iE13E137AA2A68B08%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_0-1631734868063.png%22%20alt%3D%22CTang885_0-1631734868063.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%20%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fcloud-app-security%2Fuser-groups%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EImporting%20user%20groups%20from%20connect%20apps%3C%2FA%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%22236px%22%3EThis%20article%20outlines%20the%20steps%20on%20how%20to%20import%20user%20groups%20from%20connected%20apps%26nbsp%3B%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%22209px%22%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_2-1631683617982.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310489i016B8CE51018C6CD%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_2-1631683617982.png%22%20alt%3D%22CTang885_2-1631683617982.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%20%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DkLbbWIDocaU%26amp%3Blist%3DPLXPr7gfUMmKxS1SYNgDaQY-9Q6cOqFxvG%26amp%3Bindex%3D6%26amp%3Bt%3D0s%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EConfigure%20Admin%20Roles%3C%2FA%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%22209px%22%3EIn%20this%20video%2C%20we%20show%20you%20how%20to%20configure%20admin%20roles%20and%20set%20up%20role-based%20access%20controls.%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%22209px%22%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_0-1631734868063.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310673iE13E137AA2A68B08%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_0-1631734868063.png%22%20alt%3D%22CTang885_0-1631734868063.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%20%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fcloud-app-security%2Fmanage-admins%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EManage%20Admin%20Access%3C%2FA%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%22209px%22%3EThis%20article%20describes%20how%20to%20manage%20admin%20access%20in%20%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E.%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%22209px%22%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_2-1631683617982.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310489i016B8CE51018C6CD%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_2-1631683617982.png%22%20alt%3D%22CTang885_2-1631683617982.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%20%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DEKcP72EZG-4%26amp%3Blist%3DPLhTS5hnNCfqdxyqr9JOMifwk_cZmBBz9Z%26amp%3Bindex%3D5%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EConfigure%20MSSP%20Access%3C%2FA%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%22209px%22%3EIn%20this%20video%2C%20we%20walk%20through%20the%20steps%20on%20adding%20Managed%20Security%20Service%20Provider%20(MSSP)%20access%20to%20%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E.%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%22236px%22%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_2-1631683617982.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310489i016B8CE51018C6CD%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_2-1631683617982.png%22%20alt%3D%22CTang885_2-1631683617982.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%20%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3F_lrsc%3D8f63342f-14ba-4869-a643-fb455fc72bce%26amp%3Bv%3DlssbnLv1drE%26amp%3Bfeature%3Dyoutu.be%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EAccess%20Security%20configuration%20Assessments%20of%20Azure%2C%20AWS%2C%20and%20GCP%20in%20Microsoft%20Defender%20for%20Cloud%20Apps%3C%2FA%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%22236px%22%3EThis%20video%20provides%20an%20overview%20of%20how%20to%20view%20security%20configuration%20information%20in%20%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%26nbsp%3B%3C%2FSPAN%3Efor%20Azure%2C%20AWS%2C%20and%20GCP.%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%22209px%22%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_0-1631734868063.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310673iE13E137AA2A68B08%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_0-1631734868063.png%22%20alt%3D%22CTang885_0-1631734868063.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%20%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fcloud-app-security%2Fsecurity-config%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EGet%20Configuration%20overview%3C%2FA%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%22209px%22%3EThis%20article%20describes%20how%20to%20access%20the%20security%20configuration%20information%20for%20Azure%2C%20AWS%2C%20and%20GCP%20in%20%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E.%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3C%2FTBODY%3E%0A%3C%2FTABLE%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH3%20id%3D%22toc-hId-108303732%22%20id%3D%22toc-hId-112240144%22%3E%3CSTRONG%3EModule%204.%26nbsp%3B%20Cloud%20Discovery%3C%2FSTRONG%3E%3C%2FH3%3E%0A%3CTABLE%20border%3D%221%22%20width%3D%22100%25%22%3E%0A%3CTBODY%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2229px%22%3E%3CSTRONG%3ETraining%20Title%3C%2FSTRONG%3E%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2229px%22%3E%3CSTRONG%3EDescription%3C%2FSTRONG%3E%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2229px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_2-1631688701356.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310504i0B7E984E60691F62%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_2-1631688701356.png%22%20alt%3D%22CTang885_2-1631688701356.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-security-and%2Fdeep-dive-into-cloud-app-discovery-guest-blog%2Fba-p%2F2090715%22%20target%3D%22_blank%22%3EIntroduction%20to%20Microsoft%20Defender%20for%20Cloud%20Apps%20Cloud%20Discovery%3C%2FA%3E%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2229px%22%3EThis%20blog%20details%20how%20to%20get%20started%20in%20Cloud%20Discovery%20in%20%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E.%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_2-1631688701356.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310504i0B7E984E60691F62%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_2-1631688701356.png%22%20alt%3D%22CTang885_2-1631688701356.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fcloud-app-security%2Fdaily-activities-to-protect-your-cloud-environment%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EDashboard%20Basics%3C%2FA%3E%3C%2FTD%3E%0A%3CTD%3EThis%20article%20gives%20a%20basic%20overview%20of%20how%20to%20navigate%20and%20use%20the%20dashboard.%26nbsp%3B%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2283px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_0-1631725316135.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310625i91572D49BDA0DE80%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_0-1631725316135.png%22%20alt%3D%22CTang885_0-1631725316135.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%20%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fcloud-app-security%2Fdiscovered-apps%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EDiscovered%20Apps%3C%2FA%3E%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2283px%22%3EThis%20article%20provides%20guidance%20on%20working%20with%20the%20discovered%20apps%20and%20dives%20deeper%20into%20the%20information%20provided%20by%20the%20dashboard.%26nbsp%3B%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2256px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_2-1631683617982.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310489i016B8CE51018C6CD%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_2-1631683617982.png%22%20alt%3D%22CTang885_2-1631683617982.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%20%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DvMFyBZh7pyI%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EApp%20Risk%20Scoring%3C%2FA%3E%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2256px%22%3EThis%20video%20provides%20an%20overview%20of%20how%20%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%26nbsp%3B%3C%2FSPAN%3Eevaluates%20the%20risk%20over%20discovered%20SaaS%20apps%20in%20your%20environment.%26nbsp%3B%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2256px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_2-1631683617982.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310489i016B8CE51018C6CD%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_2-1631683617982.png%22%20alt%3D%22CTang885_2-1631683617982.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%20%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DSWznxkJZHXY%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EUsing%20the%20Cloud%20App%20Discovery%20Feature%3C%2FA%3E%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2256px%22%3EThis%20video%20provides%20an%20overview%20of%20%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E'%20cloud%20apps%20discovery%20feature.%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3C%2FTBODY%3E%0A%3C%2FTABLE%3E%0A%3CH3%20id%3D%22toc-hId--1699150731%22%20id%3D%22toc-hId--1695214319%22%3E%26nbsp%3B%3C%2FH3%3E%0A%3CH3%20id%3D%22toc-hId-788362102%22%20id%3D%22toc-hId-792298514%22%3E%3CSTRONG%3EModule%205.%26nbsp%3B%20Information%20Protection%20and%20Real-Time%20Controls%3C%2FSTRONG%3E%3C%2FH3%3E%0A%3CTABLE%20border%3D%221%22%20width%3D%22100%25%22%3E%0A%3CTBODY%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2229px%22%3E%3CSTRONG%3ETraining%20Title%3C%2FSTRONG%3E%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2229px%22%3E%3CSTRONG%3EDescription%3C%2FSTRONG%3E%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2283px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_2-1631683617982.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310489i016B8CE51018C6CD%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_2-1631683617982.png%22%20alt%3D%22CTang885_2-1631683617982.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%20%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DA10oxaxSj_Q%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EConnect%20Office%20365%3C%2FA%3E%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2283px%22%3EThis%20video%20demonstrates%20how%20to%20connect%20Office%20365%20to%20%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E%20and%20enable%20our%20powerful%20capabilities%20across%20DLP%2C%20Threat%20Protection%2C%20and%20more.%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2283px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_2-1631683617982.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310489i016B8CE51018C6CD%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_2-1631683617982.png%22%20alt%3D%22CTang885_2-1631683617982.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%20%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DCvsjM8TX81c%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EWhat%20is%20Conditional%20Access%20App%20Control%3F%3C%2FA%3E%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2283px%22%3EIn%20this%20video%2C%20we%20explore%20what%20Conditional%20Access%20App%20Control%20is%2C%20how%20to%20deploy%20and%20configure%20it%2C%20and%20testing%20a%20scenario%20(Microsoft%20Teams).%26nbsp%3B%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2256px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_2-1631683617982.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310489i016B8CE51018C6CD%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_2-1631683617982.png%22%20alt%3D%22CTang885_2-1631683617982.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%20%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3F_lrsc%3Dee39b743-5fe1-4af2-b64c-2aa285cd1cbc%26amp%3Bv%3DkVMjeVxHNxI%26amp%3Bfeature%3Dyoutu.be%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EGovernance%20actions%20for%20non-O365%20and%20Azure%20apps%3C%2FA%3E%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2256px%22%3EThis%20video%20provides%20an%20overview%20of%20some%20of%20the%20governance%20actions%20that%20can%20be%20taken%20with%20%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E.%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%22109px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_2-1631683617982.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310489i016B8CE51018C6CD%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_2-1631683617982.png%22%20alt%3D%22CTang885_2-1631683617982.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%20%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DOt-dKobuDrY%26amp%3Bfeature%3Demb_logo%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EConfigure%20AAD%20with%20Microsoft%20Defender%20for%20Cloud%20Apps%20Conditional%20Access%20App%20for%20Session%20Controls%20(Downloads)%3C%2FA%3E%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%22109px%22%3EIn%20this%20video%2C%20we%20walk%20through%20how%20to%20configure%20real-time%20monitoring%20and%20control%20across%20your%20cloud%20apps%20leveraging%20our%20powerful%2C%20native%20integration%20with%20Azure%20AD%20conditional%20Access%20to%20provide%20inline%20controls%20for%20your%20downloads.%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2256px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_0-1631725316135.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310625i91572D49BDA0DE80%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_0-1631725316135.png%22%20alt%3D%22CTang885_0-1631725316135.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fcloud-app-security%2Fuse-case-proxy-block-session-aad%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3E%20Block%20Sensitive%20Information%20Downloads%3C%2FA%3E%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2256px%22%3EThis%20article%20walks%20you%20through%20a%20tutorial%20on%20how%20to%20create%20a%20session%20policy%20to%20block%20the%20download%20of%20sensitive%20information.%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%22109px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_2-1631683617982.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310489i016B8CE51018C6CD%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_2-1631683617982.png%22%20alt%3D%22CTang885_2-1631683617982.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3F_lrsc%3D6cff21ff-da2e-484d-a7ce-e6ac616910e8%26amp%3Bv%3DHS5CKs7xqSo%26amp%3Bfeature%3Dyoutu.be%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EConfigure%20AAD%20with%20Microsoft%20Defender%20for%20Cloud%20Apps%20Conditional%20Access%20App%20for%20Session%20Controls%20(Uploads)%3C%2FA%3E%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%22109px%22%3EIn%20this%20video%2C%20we%20walk%20through%20how%20to%20configure%20real-time%20monitoring%20and%20control%20across%20your%20cloud%20apps%20leveraging%20our%20powerful%2C%20native%20integration%20with%20Azure%20AD%20conditional%20Access%20to%20provide%20inline%20controls%20for%20your%20uploads.%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2229px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_2-1631688701356.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310504i0B7E984E60691F62%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_2-1631688701356.png%22%20alt%3D%22CTang885_2-1631688701356.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fsecurity-compliance-and-identity%2Funderstanding-unified-labeling-migration%2Fba-p%2F783185%22%20target%3D%22_blank%22%3EUnderstand%20Unified%20Labeling%20Migration%3C%2FA%3E%26nbsp%3B%20%26nbsp%3B%3CFONT%20color%3D%22%23800080%22%3E%3CEM%3E%3CSTRONG%3E%3CFONT%20size%3D%222%22%3E%5BNew!%5D%3C%2FFONT%3E%3C%2FSTRONG%3E%3C%2FEM%3E%3C%2FFONT%3E%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2229px%22%3EThis%20blog%20explains%20what%20%22Unified%20Labeling%22%20is%20and%20how%20to%20use%20it%20in%20the%20migration%20scenario.%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3C%2FTBODY%3E%0A%3C%2FTABLE%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH3%20class%3D%22lia-message-body%22%20id%3D%22toc-hId--1019092361%22%20id%3D%22toc-hId--1015155949%22%3E%3CSTRONG%3EModule%206.%26nbsp%3B%20Threat%20Detection%3C%2FSTRONG%3E%3C%2FH3%3E%0A%3CTABLE%20border%3D%221%22%20width%3D%22100%25%22%3E%0A%3CTBODY%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%3E%3CSTRONG%3ETraining%20Title%3C%2FSTRONG%3E%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%3E%3CSTRONG%3EDescription%3C%2FSTRONG%3E%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_2-1631683617982.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310489i016B8CE51018C6CD%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_2-1631683617982.png%22%20alt%3D%22CTang885_2-1631683617982.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%20%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DfpAZ9l_lOWw%26amp%3Blist%3DPLXPr7gfUMmKxS1SYNgDaQY-9Q6cOqFxvG%26amp%3Bindex%3D19%26amp%3Bt%3D0s%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EThreat%20Detection%20Overview%3C%2FA%3E%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%3EIn%20this%20video%2C%20we%20walk%20through%20%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps'%3C%2FSPAN%3E%20detection%20capabilities%20that%20allow%20you%20to%20identify%20advanced%20attackers%20and%20insider%20threats.%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_2-1631683617982.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310489i016B8CE51018C6CD%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_2-1631683617982.png%22%20alt%3D%22CTang885_2-1631683617982.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%20%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3Duw8TCuNonhU%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EUser%20and%20Entity%20Behavior%20Analytics%3C%2FA%3E%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%3EThis%20video%20provides%20a%20brief%20overview%20of%20User%20%26amp%3B%20Entity%20Analytics%20(UEBA)%20in%20%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E.%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_2-1631683617982.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310489i016B8CE51018C6CD%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_2-1631683617982.png%22%20alt%3D%22CTang885_2-1631683617982.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%20%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DegqjPhdaqFE%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EDiscover%20and%20Manage%20Risky%20OAuth%20applications%3C%2FA%3E%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%3EIn%20this%20video%2C%20we%20explore%20how%20%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E%20can%20help%20you%20identify%20when%20users%20authorized%20OAuth%20apps%2C%20detect%20risky%20apps%2C%20and%20evoke%20access%20to%20risky%20apps.%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_0-1631725316135.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310625i91572D49BDA0DE80%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_0-1631725316135.png%22%20alt%3D%22CTang885_0-1631725316135.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fcloud-app-security%2Finvestigate-anomaly-alerts%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EHow%20to%20investigate%20anomaly%20detection%20alerts%3C%2FA%3E%26nbsp%3B%20%3CFONT%20color%3D%22%23800080%22%3E%3CSTRONG%3E%3CEM%3E%3CFONT%20size%3D%222%22%3E%26nbsp%3B%5BNew!%5D%3C%2FFONT%3E%3C%2FEM%3E%3C%2FSTRONG%3E%3C%2FFONT%3E%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%3EThis%20article%20provides%20general%20information%20on%20alerts%20that%20are%20detected%20by%20%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E%2C%20and%20practical%20guidance%20on%20what%20needs%20to%20be%20done%20for%20alert%20investigation%20and%20remediation.%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_0-1631725316135.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310625i91572D49BDA0DE80%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_0-1631725316135.png%22%20alt%3D%22CTang885_0-1631725316135.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fcloud-app-security%2Fmanage-app-permissions%23working-with-the-oauth-apps-page%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EManage%20OAuth%20apps%20-%20Working%20with%20the%20OAuth%20app%20page%3C%2FA%3E%26nbsp%3B%3CFONT%20color%3D%22%23800080%22%3E%3CSTRONG%3E%3CEM%3E%3CFONT%20size%3D%222%22%3E%5BNew!%5D%3C%2FFONT%3E%3C%2FEM%3E%3C%2FSTRONG%3E%3C%2FFONT%3E%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%3EThis%20article%20provides%20instructions%20on%20using%20%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E%20to%20manage%20OAuth%20applications.%26nbsp%3B%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3C%2FTBODY%3E%0A%3C%2FTABLE%3E%0A%3CH2%20class%3D%22lia-message-body-wrapper%20lia-component-message-view-widget-body%22%20id%3D%22toc-hId-1339337753%22%20id%3D%22toc-hId-1343274165%22%3E%3CA%20title%3D%22MCAS%20Fundamentals%20Knowledge%20Check%22%20href%3D%22https%3A%2F%2Fforms.office.com%2FPages%2FResponsePage.aspx%3Fid%3Dv4j5cvGGr0GRqy180BHbR5ux0wrHAn9NiZHjg_f7qV9UMDBZTUgxNzAxMUE5SVpDMkhaVU0yWjhJRC4u%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-left%22%20image-alt%3D%22CTang885_1-1631773341527.png%22%20style%3D%22width%3A%2094px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310743i07EE7B080B224DAC%2Fimage-dimensions%2F94x106%3Fv%3Dv2%22%20width%3D%2294%22%20height%3D%22106%22%20role%3D%22button%22%20title%3D%22CTang885_1-1631773341527.png%22%20alt%3D%22CTang885_1-1631773341527.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FA%3E%26nbsp%3B%3CSTRONG%3E%3CFONT%20size%3D%226%22%3E%3CA%20style%3D%22font-family%3A%20inherit%3B%20background-color%3A%20%23ffffff%3B%22%20href%3D%22https%3A%2F%2Fforms.office.com%2FPages%2FResponsePage.aspx%3Fid%3Dv4j5cvGGr0GRqy180BHbR5ux0wrHAn9NiZHjg_f7qV9UMDBZTUgxNzAxMUE5SVpDMkhaVU0yWjhJRC4u%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EKnowledge%20Check%20-%20Microsoft%20Defender%20for%20Cloud%20Apps%20Fundamentals%26nbsp%3B%3C%2FA%3E%3C%2FFONT%3E%3CSPAN%20style%3D%22color%3A%20inherit%3B%20font-family%3A%20inherit%3B%22%3E%3CFONT%20size%3D%226%22%3E%26nbsp%3B%3C%2FFONT%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FSTRONG%3E%3C%2FH2%3E%0A%3CH3%20class%3D%22lia-message-body-wrapper%20lia-component-message-view-widget-body%22%20id%3D%22toc-hId-359127950%22%20id%3D%22toc-hId-363064362%22%3E%26nbsp%3B%3C%2FH3%3E%0A%3CH2%20data-unlink%3D%22true%22%20id%3D%22toc-hId--1577409232%22%20id%3D%22toc-hId--1573472820%22%3E%26nbsp%3B%3C%2FH2%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId--521362834%22%20data-unlink%3D%22true%22%20id%3D%22toc-hId-910103601%22%20id%3D%22toc-hId-914040013%22%3E%3CSTRONG%3E%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E%20-%20Intermediate%20%5BAssociate%20Level%5D%3C%2FSTRONG%3E%3C%2FH2%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH3%20id%3D%22toc-hId--768268143%22%20id%3D%22toc-hId--764331731%22%3E%3CSTRONG%3EModule%201.%20Intermediate%20Level%20Overview%3C%2FSTRONG%3E%3C%2FH3%3E%0A%3CTABLE%20border%3D%221%22%20width%3D%22100%25%22%3E%0A%3CTBODY%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2229px%22%3E%3CSTRONG%3ETraining%20Title%3C%2FSTRONG%3E%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2229px%22%3E%3CSTRONG%3EDescription%3C%2FSTRONG%3E%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20height%3D%22236px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_2-1631683617982.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310489i016B8CE51018C6CD%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_2-1631683617982.png%22%20alt%3D%22CTang885_2-1631683617982.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%3CA%20href%3D%22http%3A%2F%2Faka.ms%2Fintermediatevideo%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3E%20Introduction%20to%20Microsoft%20Defender%20for%20Cloud%20Apps%20Intermediate%20Level%20Training%3C%2FA%3E%3C%2FTD%3E%0A%3CTD%20height%3D%22236px%22%3EThis%20video%20provides%20a%20summary%20of%20what%20contents%20will%20be%20covered%20in%20the%20Intermediate%20(Associate%20level)%20training%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%22236px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_2-1631683617982.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310489i016B8CE51018C6CD%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_2-1631683617982.png%22%20alt%3D%22CTang885_2-1631683617982.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%20%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DfM3_0P8MFUo%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3A%20Overview%3C%2FA%3E%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%22236px%22%3EThis%20is%20an%20overview%20video%20that%20discusses%20the%20different%20pillars%20and%20configuration%20steps%20for%20%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E%20with%20demo.%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2256px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_2-1631688701356.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310504i0B7E984E60691F62%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_2-1631688701356.png%22%20alt%3D%22CTang885_2-1631688701356.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fsecurity-compliance-and-identity%2Fsecure-access-for-applications-with-microsoft-cloud-app-security%2Fba-p%2F2157495%22%20target%3D%22_blank%22%3E%20Secure%20Access%20for%20applications%20with%20Microsoft%20Defender%20for%20Cloud%20Apps%3C%2FA%3E%20%3CFONT%20color%3D%22%23800080%22%3E%3CSTRONG%3E%3CEM%3E%5BNew!%5D%3C%2FEM%3E%3C%2FSTRONG%3E%3C%2FFONT%3E%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2256px%22%3EThis%20article%20walks%20through%20how%20to%20secure%20access%20for%20applications%20with%20%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E.%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3C%2FTBODY%3E%0A%3C%2FTABLE%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH3%20id%3D%22toc-hId-1719244690%22%20id%3D%22toc-hId-1723181102%22%3E%3CSTRONG%3EModule%202.%20Cloud%20Discovery%3C%2FSTRONG%3E%3C%2FH3%3E%0A%3CTABLE%20border%3D%221%22%20width%3D%22100%25%22%3E%0A%3CTBODY%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2229px%22%3E%3CSTRONG%3ETraining%20Title%3C%2FSTRONG%3E%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2229px%22%3E%3CSTRONG%3EDescription%3C%2FSTRONG%3E%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2256px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_0-1631834559565.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310901i124DDE2742CC7C6E%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_0-1631834559565.png%22%20alt%3D%22CTang885_0-1631834559565.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%20%3CA%20href%3D%22https%3A%2F%2Fmslearn.cloudguides.com%2Fen-us%2Fguides%2FDiscover%2520and%2520manage%2520cloud%2520app%2520usage%2520with%2520Microsoft%2520Cloud%2520App%2520Security%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3ECloud%20Discovery%20Interactive%20Guide%3C%2FA%3E%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2256px%22%3EThis%20interactive%20guide%20walks%20through%20discovering%2C%20protecting%2C%20and%20controlling%20your%20apps.%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2256px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_0-1631725316135.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310625i91572D49BDA0DE80%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_0-1631725316135.png%22%20alt%3D%22CTang885_0-1631725316135.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fcloud-app-security%2Fpolicies-cloud-discovery%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3ECloud%20Discovery%20Policies%3C%2FA%3E%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2256px%22%3EThis%20article%20goes%20over%20on%20what%20are%20the%20cloud%20discovery%20policies%20within%20your%20%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E%20environment.%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2283px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_0-1631725316135.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310625i91572D49BDA0DE80%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_0-1631725316135.png%22%20alt%3D%22CTang885_0-1631725316135.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fcloud-app-security%2Fdiscovered-apps%23exclude-entities%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EHow%20to%20exclude%26nbsp%3Bentities%20from%20discovery%20data%3C%2FA%3E%26nbsp%3B%26nbsp%3B%3CFONT%20size%3D%222%22%20style%3D%22font-family%3A%20inherit%3B%20background-color%3A%20transparent%3B%22%20color%3D%22%23800080%22%3E%3CEM%3E%3CSTRONG%3E%5BNew!%5D%3C%2FSTRONG%3E%3C%2FEM%3E%3C%2FFONT%3E%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2283px%22%3EThis%20article%20provides%20you%20with%20instructions%20on%20excluding%20certain%20entities'%20data%20from%20being%20part%20of%20the%20Cloud%20Discovery%20data%20for%20reporting.%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2229px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_0-1631725316135.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310625i91572D49BDA0DE80%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_0-1631725316135.png%22%20alt%3D%22CTang885_0-1631725316135.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fcloud-app-security%2Fmde-integration%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EMicrosoft%20Defender%20for%20Cloud%20Apps%20and%20MDE%20integration%3C%2FA%3E%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2229px%22%3EThis%20article%20walks%20through%20the%20process%20of%20integrating%20MDE%20(formerly%20MDATP)%20and%20%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E%20and%20how%20simple%20the%20integration%20is%20-%20without%20requiring%20an%20extra%20agent%20or%20proxy.%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2229px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_2-1631683617982.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310489i016B8CE51018C6CD%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_2-1631683617982.png%22%20alt%3D%22CTang885_2-1631683617982.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%20%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3F_lrsc%3D5ca4d4bf-e27c-479f-8c3c-61320e89b1c2%26amp%3Bv%3Do1fG_7I9pk8%26amp%3Bfeature%3Dyoutu.be%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EHow%20to%20design%20and%20deploy%20a%20Log%20Collector%20for%20Microsoft%20Defender%20for%20Cloud%20Apps%3C%2FA%3E%20%26nbsp%3B%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2229px%22%3EThis%20video%20details%20the%20%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E%20cloud%20discovery%20pillar%20and%20how%20to%20deploy%20a%20log%20collector.%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2229px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_0-1631725316135.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310625i91572D49BDA0DE80%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_0-1631725316135.png%22%20alt%3D%22CTang885_0-1631725316135.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fcloud-app-security%2Fzscaler-integration%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EIntegrate%20with%20Zscaler%3C%2FA%3E%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2229px%22%3EIf%20you%20work%20with%20both%20%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E%20and%20Zscaler%2C%20you%20can%20integrate%20the%20two%20products%20to%20enhance%20your%20security%20Cloud%20Discovery%20experience.%26nbsp%3B%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2229px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_0-1631725316135.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310625i91572D49BDA0DE80%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_0-1631725316135.png%22%20alt%3D%22CTang885_0-1631725316135.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fcloud-app-security%2Fiboss-integration%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EIntegrate%20with%20iboss%3C%2FA%3E%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2229px%22%3EIf%20you%20work%20with%20both%20%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E%20and%20iboss%2C%20you%20can%20integrate%20the%20two%20products%20to%20enhance%20your%20security%20Cloud%20Discovery%20experience.%26nbsp%3B%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2229px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_0-1631725316135.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310625i91572D49BDA0DE80%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_0-1631725316135.png%22%20alt%3D%22CTang885_0-1631725316135.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fcloud-app-security%2Fcorrata-integration%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EIntegrate%20with%20Corrata%3C%2FA%3E%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2229px%22%3EIf%20you%20work%20with%20both%20%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E%20and%20Corrata%2C%20you%20can%20integrate%20the%20two%20products%20to%20enhance%20your%20security%20Cloud%20Discovery%20experience.%26nbsp%3B%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2229px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_0-1631725316135.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310625i91572D49BDA0DE80%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_0-1631725316135.png%22%20alt%3D%22CTang885_0-1631725316135.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fcloud-app-security%2Fmenlo-integration%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EIntegrate%20with%20Menlo%3C%2FA%3E%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2229px%22%3E%26nbsp%3BIf%20you%20work%20with%20both%20%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E%20and%20Menlo%2C%20you%20can%20integrate%20the%20two%20products%20to%20enhance%20your%20security%20Cloud%20Discovery%20experience.%26nbsp%3B%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3C%2FTBODY%3E%0A%3C%2FTABLE%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH3%20id%3D%22toc-hId--88209773%22%20id%3D%22toc-hId--84273361%22%3E%26nbsp%3B%3CSTRONG%3EModule%203.%26nbsp%3BInformation%20Protection%20and%20Real-Time%26nbsp%3B%20Controls%3C%2FSTRONG%3E%3C%2FH3%3E%0A%3CTABLE%20border%3D%221%22%20width%3D%22100%25%22%3E%0A%3CTBODY%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2230px%22%3E%3CSTRONG%3ETraining%20Title%3C%2FSTRONG%3E%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2230px%22%3E%3CSTRONG%3EDescription%3C%2FSTRONG%3E%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%22235px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_0-1631743524020.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310699i29A95A9BE16E6D94%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_0-1631743524020.png%22%20alt%3D%22CTang885_0-1631743524020.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%20%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3F_lrsc%3D9aff83a6-a043-446c-8a69-6d59639d35e1%26amp%3Bv%3Dt2cBac1Zd8Y%26amp%3Bfeature%3Dyoutu.be%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3ESet%20up%20Document%20Fingerprinting%20in%20Microsoft%20Defender%20for%20Cloud%20Apps%3C%2FA%3E%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%22235px%22%3EIn%20this%20video%2C%20we%20walk%20through%20how%20to%20configure%20a%20file%20policy%20to%20detect%20document%20fingerprinting%20in%20your%20file%20repositories%20using%20%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E.%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%22235px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_1-1631743558581.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310700i3F5BAA996E6DB6F5%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_1-1631743558581.png%22%20alt%3D%22CTang885_1-1631743558581.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%20%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DPaal4I-vdF0%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EDocument%20fingerprinting%20in%20Microsoft%20365%20Compliance%3C%2FA%3E%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%22235px%22%3EIn%20this%20video%2C%20we%20walk%20through%20how%20to%20set%20up%20policies%20to%20detect%20document%20fingerprinting%20using%20Microsoft%20365.%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%22435px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_5-1631683617963.png%22%20style%3D%22width%3A%200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310492i241B86E53ED8898F%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20width%3D%220%22%20height%3D%220%22%20role%3D%22button%22%20title%3D%22CTang885_5-1631683617963.png%22%20alt%3D%22CTang885_5-1631683617963.png%22%20%2F%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_2-1631743975895.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310701i53582AC43633EA6A%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_2-1631743975895.png%22%20alt%3D%22CTang885_2-1631743975895.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%20%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fmslearn.cloudguides.com%2Fen-us%2Fguides%2FProtect%2520and%2520control%2520information%2520with%2520Microsoft%2520Cloud%2520App%2520Security%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EProtect%20and%20Control%20Information%20with%20Microsoft%20Defender%20for%20Cloud%20Apps%3C%2FA%3E%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%22435px%22%3EIn%20this%20interactive%20guide%2C%20we%20walk%20through%20common%20scenarios%20where%20you%20can%20control%20your%20information%20with%20%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E.%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%22205px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_2-1631688701356.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310504i0B7E984E60691F62%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_2-1631688701356.png%22%20alt%3D%22CTang885_2-1631688701356.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-security-and%2Fsecure-your-github-deployment-using-microsoft-cloud-app-security%2Fba-p%2F1882423%22%20target%3D%22_blank%22%3ESecure%20and%20Connect%20GitHub%3C%2FA%3E%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%22205px%22%3EThis%20blog%20walks%20through%20how%20to%20secure%20and%20connect%20your%20GitHub%20instance%20in%20%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E.%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%22205px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_1-1631743558581.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310700i3F5BAA996E6DB6F5%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_1-1631743558581.png%22%20alt%3D%22CTang885_1-1631743558581.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DyhQoIie48xU%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EProtecting%20GitHub%3C%2FA%3E%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%22205px%22%3EThis%20video%20walks%20through%20how%20to%20protect%20your%20GitHub%20instance%20using%20%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E.%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%22205px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_2-1631688701356.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310504i0B7E984E60691F62%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_2-1631688701356.png%22%20alt%3D%22CTang885_2-1631688701356.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-security-and%2Fprotect-your-box-environment-and-data-using-microsoft-cloud-app%2Fba-p%2F2080226%22%20target%3D%22_blank%22%3ESecure%20and%20Connect%20Box%3C%2FA%3E%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%22205px%22%3EThis%20blog%20walks%20through%20how%20to%20secure%20and%20connect%20your%20Box%20instance%20in%20%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E.%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%22205px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_1-1631743558581.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310700i3F5BAA996E6DB6F5%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_1-1631743558581.png%22%20alt%3D%22CTang885_1-1631743558581.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%20%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DP2DiW330aDI%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EProtecting%20Box%3C%2FA%3E%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%22205px%22%3EThis%20video%20walks%20through%20how%20to%20protect%20your%20data%20in%20Box%20using%20%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E.%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%22235px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_2-1631688701356.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310504i0B7E984E60691F62%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_2-1631688701356.png%22%20alt%3D%22CTang885_2-1631688701356.png%22%20%2F%3E%3C%2FSPAN%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fsecurity-compliance-and-identity%2Fprotect-your-slack-environment-using-microsoft-cloud-app%2Fba-p%2F2595474%22%20target%3D%22_blank%22%3E%26nbsp%3BProtect%20your%20Slack%20environment%20using%20Microsoft%20Defender%20for%20Cloud%20Apps%3C%2FA%3E%26nbsp%3B%26nbsp%3B%3CSTRONG%3E%3CEM%3E%3CFONT%20color%3D%22%23800080%22%3E%5BNew!%5D%3C%2FFONT%3E%3C%2FEM%3E%3C%2FSTRONG%3E%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%22235px%22%3EThis%20blog%20walks%20through%20how%20to%20protect%20your%20Slack%20environment%20using%20%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E.%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%22235px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_0-1631725316135.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310625i91572D49BDA0DE80%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_0-1631725316135.png%22%20alt%3D%22CTang885_0-1631725316135.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fcloud-app-security%2Fprotect-slack%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EHow%20Microsoft%20Defender%20for%20Cloud%20Apps%20helps%20protect%20your%20Slack%20Enterprise%3C%2FA%3E%3CSTRONG%3E%3CEM%3E%3CFONT%20color%3D%22%23800080%22%3E%26nbsp%3B%5BNew!%7D%3C%2FFONT%3E%3C%2FEM%3E%3C%2FSTRONG%3E%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%22235px%22%3EThis%20article%20goes%20over%20the%20capabilities%20in%20%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E%20that%20can%20protect%20the%20Slack%20Enterprise%20environment.%26nbsp%3B%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20height%3D%22235px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_2-1631688701356.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310504i0B7E984E60691F62%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_2-1631688701356.png%22%20alt%3D%22CTang885_2-1631688701356.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-security-and%2Fprotect-your-aws-environment-using-microsoft-cloud-app-security%2Fba-p%2F2150380%22%20target%3D%22_blank%22%3EProtect%20your%20AWS%20environment%20using%20Microsoft%20Defender%20for%20Cloud%20Apps%3C%2FA%3E%26nbsp%3B%3CFONT%20color%3D%22%23800080%22%3E%3CEM%3E%3CSTRONG%3E%5BNew!%7D%3C%2FSTRONG%3E%3C%2FEM%3E%3C%2FFONT%3E%26nbsp%3B%26nbsp%3B%3C%2FTD%3E%0A%3CTD%20height%3D%22235px%22%3EThis%20blog%20walks%20through%20how%20to%20secure%20and%20connect%20your%20AWS%20instance%20in%20%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E.%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20height%3D%2256px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_1-1631743558581.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310700i3F5BAA996E6DB6F5%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_1-1631743558581.png%22%20alt%3D%22CTang885_1-1631743558581.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%20%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DN7Xs2Vq3YAM%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EConnect%20AWS%20for%20security%20auditing%20in%20Microsoft%20Defender%20for%20Cloud%20Apps%3C%2FA%3E%3C%2FTD%3E%0A%3CTD%20height%3D%2256px%22%3EThis%20video%20walks%20through%20how%20to%20connect%20to%20AWS%20for%20security%20auditing%20in%20%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E.%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20height%3D%2256px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_1-1631743558581.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310700i3F5BAA996E6DB6F5%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_1-1631743558581.png%22%20alt%3D%22CTang885_1-1631743558581.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%20%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3D6ZMjkoTG6xc%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EConnect%20AWS%20for%20security%20configuration%20in%20Microsoft%20Defender%20for%20Cloud%20Apps%3C%2FA%3E%3C%2FTD%3E%0A%3CTD%20height%3D%2256px%22%3EThis%20video%20walks%20through%20how%20to%20connect%20to%20AWS%20for%20security%20configuration%20in%20%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E.%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20height%3D%2256px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_1-1631743558581.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310700i3F5BAA996E6DB6F5%2Fimage-size%2Fmedium%3Fv%3Dv2%26amp%3Bpx%3D400%22%20role%3D%22button%22%20title%3D%22CTang885_1-1631743558581.png%22%20alt%3D%22CTang885_1-1631743558581.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%20%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DtJQFEj7q1go%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EConnect%20AWS%20for%20laaS%20protection%20in%20Microsoft%20Defender%20for%20Cloud%20Apps%3C%2FA%3E%3C%2FTD%3E%0A%3CTD%20height%3D%2256px%22%3EThis%20video%20walks%20through%20how%20to%20connect%20to%20AWS%20for%20laaS%20protection%20in%20%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E.%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20height%3D%2256px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_0-1631725316135.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310625i91572D49BDA0DE80%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_0-1631725316135.png%22%20alt%3D%22CTang885_0-1631725316135.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%20%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fcloud-app-security%2Fprotect-onelogin%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EHow%20Microsoft%20Defender%20for%20Cloud%20Apps%20helps%20protect%20your%20oneLogin%20(Preview)%26nbsp%3B%3C%2FA%3E%26nbsp%3B%3CFONT%20color%3D%22%23800080%22%3E%3CEM%3E%3CSTRONG%3E%5BNew!%5D%3C%2FSTRONG%3E%3C%2FEM%3E%3C%2FFONT%3E%26nbsp%3B%3C%2FTD%3E%0A%3CTD%20height%3D%2256px%22%3EThis%20article%20provides%20information%20on%20how%20%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E%20protects%20the%20One%20Login%20environment.%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20height%3D%2256px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_0-1631725316135.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310625i91572D49BDA0DE80%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_0-1631725316135.png%22%20alt%3D%22CTang885_0-1631725316135.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fcloud-app-security%2Fprotect-zendesk%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EHow%20Microsoft%20Defender%20for%20Cloud%20Apps%20helps%20protect%20your%20Zendesk%20(Preview)%3C%2FA%3E%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%3CFONT%20color%3D%22%23800080%22%3E%3CEM%3E%3CSTRONG%3E%5BNew!%5D%3C%2FSTRONG%3E%3C%2FEM%3E%3C%2FFONT%3E%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%26nbsp%3B%3C%2FTD%3E%0A%3CTD%20height%3D%2256px%22%3EThis%20article%20provides%20information%20on%20how%20%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E%20protects%20the%20Zendesk%20environment.%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20height%3D%2256px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_0-1631725316135.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310625i91572D49BDA0DE80%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_0-1631725316135.png%22%20alt%3D%22CTang885_0-1631725316135.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%20%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fcloud-app-security%2Fconnect-servicenow-to-microsoft-cloud-app-security%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EConnect%20ServiceNow%20to%20Microsoft%20Defender%20for%20Cloud%20Apps%20(Preview)%3C%2FA%3E%26nbsp%3B%26nbsp%3B%26nbsp%3B%3CFONT%20color%3D%22%23800080%22%3E%3CEM%3E%3CSTRONG%3E%5BNew!%5D%3C%2FSTRONG%3E%3C%2FEM%3E%3C%2FFONT%3E%26nbsp%3B%3C%2FTD%3E%0A%3CTD%20height%3D%2256px%22%3EThis%20article%20steps%20through%20how%20to%20connect%20%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E%20to%20your%20existing%20ServiceNow%20account%20using%20the%20application's%20API.%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20height%3D%2256px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_1-1631743558581.png%22%20style%3D%22width%3A%200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310700i3F5BAA996E6DB6F5%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20width%3D%220%22%20height%3D%220%22%20role%3D%22button%22%20title%3D%22CTang885_1-1631743558581.png%22%20alt%3D%22CTang885_1-1631743558581.png%22%20%2F%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_1-1631743558581.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310700i3F5BAA996E6DB6F5%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_1-1631743558581.png%22%20alt%3D%22CTang885_1-1631743558581.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%26nbsp%3B%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3D_J9kctMKZTE%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EProtecting%20Storage%20Apps%20and%20Malware%20Detection%3C%2FA%3E%3C%2FTD%3E%0A%3CTD%20height%3D%2256px%22%3EThis%20video%20shows%20you%20how%20%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E%20can%20help%20you%20protect%20your%20cloud%20storage%20apps%20and%20ensure%20that%20they%20are%20not%20infected%20with%20malware.%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20height%3D%2229px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_0-1631725316135.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310625i91572D49BDA0DE80%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_0-1631725316135.png%22%20alt%3D%22CTang885_0-1631725316135.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%20%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fcloud-app-security%2Fanomaly-detection-policy%23malware-detection%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EMalware%20detection%20in%20Microsoft%20Defender%20for%20Cloud%20Apps%3C%2FA%3E%3C%2FTD%3E%0A%3CTD%20height%3D%2229px%22%3EThis%20article%20explains%20how%20malware%20detection%20work%20in%20%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E.%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20height%3D%2283px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_1-1631743558581.png%22%20style%3D%22width%3A%200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310700i3F5BAA996E6DB6F5%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20width%3D%220%22%20height%3D%220%22%20role%3D%22button%22%20title%3D%22CTang885_1-1631743558581.png%22%20alt%3D%22CTang885_1-1631743558581.png%22%20%2F%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_1-1631743558581.png%22%20style%3D%22width%3A%200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310700i3F5BAA996E6DB6F5%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20width%3D%220%22%20height%3D%220%22%20role%3D%22button%22%20title%3D%22CTang885_1-1631743558581.png%22%20alt%3D%22CTang885_1-1631743558581.png%22%20%2F%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_0-1631748312424.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310711iE364068BD02426E2%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_0-1631748312424.png%22%20alt%3D%22CTang885_0-1631748312424.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%20%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DF3WTTKcKmGk%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EConfiguring%20a%20read-only%20mode%20for%20external%20users%3C%2FA%3E%3C%2FTD%3E%0A%3CTD%20height%3D%2283px%22%3EThis%20video%20walks%20you%20through%20one%20of%20the%20many%20use-cases%20focused%20on%20external%20users%20using%20Conditional%20Access%20App%20Control%20-%20our%20reverse%20proxy%20solution.%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20height%3D%2256px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_0-1631748312424.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310711iE364068BD02426E2%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_0-1631748312424.png%22%20alt%3D%22CTang885_0-1631748312424.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%20%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DLkP0UGBswsQ%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EBlock%20unauthorized%20browsers%20from%20accessing%20corporate%20web%20apps%3C%2FA%3E%3C%2FTD%3E%0A%3CTD%20height%3D%2256px%22%3EThis%20video%20detailing%20the%20policy%20configuration%20required%20to%20block%20unauthorized%20browsers%20from%20accessing%20corporate%20web%20applications.%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20height%3D%2256px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_0-1631725316135.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310625i91572D49BDA0DE80%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_0-1631725316135.png%22%20alt%3D%22CTang885_0-1631725316135.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fcloud-app-security%2Fuse-case-admin-quarantine%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EUsing%20Admin%20Quarantine%20to%20investigate%20files%3C%2FA%3E%3C%2FTD%3E%0A%3CTD%20height%3D%2256px%22%3EThis%20article%20is%20a%20tutorial%20that%20walks%20through%20how%20to%20use%20admin%20quarantine%20to%20protect%20your%20files.%26nbsp%3B%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20height%3D%2256px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_0-1631725316135.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310625i91572D49BDA0DE80%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_0-1631725316135.png%22%20alt%3D%22CTang885_0-1631725316135.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fcloud-app-security%2Fuse-case-information-protection%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EAutomatically%20apply%20labels%20to%20your%20sensitive%20files%3C%2FA%3E%3C%2FTD%3E%0A%3CTD%20height%3D%2256px%22%3EThis%20article%20is%20a%20tutorial%20that%20walks%20through%20applying%20labels%20to%20a%20sensitive%20file.%26nbsp%3B%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20height%3D%2256px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_0-1631725316135.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310625i91572D49BDA0DE80%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_0-1631725316135.png%22%20alt%3D%22CTang885_0-1631725316135.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fcloud-app-security%2Fpolicies-information-protection%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EInformation%20Protection%20Policies%3C%2FA%3E%3C%2FTD%3E%0A%3CTD%20height%3D%2256px%22%3EThis%20article%20walks%20you%20through%20how%20to%20create%20information%20protection%20policies%20in%20%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E.%26nbsp%3B%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20height%3D%2256px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_2-1631688701356.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310504i0B7E984E60691F62%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_2-1631688701356.png%22%20alt%3D%22CTang885_2-1631688701356.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-security-and%2Fmcas-data-protection-blog-series-do-i-use-mcas-or-mip%2Fba-p%2F2011039%22%20target%3D%22_blank%22%3EMicrosoft%20Defender%20for%20Cloud%20Apps%20or%20MIP%3F%3C%2FA%3E%3C%2FTD%3E%0A%3CTD%20height%3D%2256px%22%3EThis%20blog%20walks%20you%20through%20some%20of%20the%20top%20use%20cases%20and%20questions%20asked%20regarding%20when%20to%20use%20%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E%20vs%20when%20to%20use%20MIP.%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20height%3D%2256px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_0-1631748312424.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310711iE364068BD02426E2%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_0-1631748312424.png%22%20alt%3D%22CTang885_0-1631748312424.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%20%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3Dqu5T16Nizho%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EAWS%20with%20AAD%20and%20Microsoft%20Defender%20for%20Cloud%20Apps%3C%2FA%3E%3C%2FTD%3E%0A%3CTD%20height%3D%2256px%22%3EIn%20this%20video%2C%20we%20walk%20through%20the%20architecture%20used%20to%20configure%20AWS%20with%20AAD%20and%20use%20%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E%20to%20apply%20additional%20protections.%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20height%3D%2256px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_2-1631688701356.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310504i0B7E984E60691F62%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_2-1631688701356.png%22%20alt%3D%22CTang885_2-1631688701356.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fsecurity-compliance-and-identity%2Fmcas-how-to-protect-aws-admins-and-developers%2Fba-p%2F1995938%22%20target%3D%22_blank%22%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3A%26nbsp%3B%20How%20to%20protect%20AWS%20admins%20and%20Developers%3C%2FA%3E%3C%2FTD%3E%0A%3CTD%20height%3D%2256px%22%3EThis%20blog%20shows%20you%20how%20to%20use%20%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E%20to%20protect%20AWS%20Admins%20and%20Developers.%26nbsp%3B%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20height%3D%2274px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_0-1631725316135.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310625i91572D49BDA0DE80%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_0-1631725316135.png%22%20alt%3D%22CTang885_0-1631725316135.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fcloud-app-security%2Fazip-integration%23how-to-integrate-azure-information-protection-with-cloud-app-security%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EAzure%20Information%20Protection%20integration%20-%20How%20to%20integrate%20Azure%20information%20Protection%20with%20Microsoft%20Defender%20for%20Cloud%20Apps%3C%2FA%3E%26nbsp%3B%26nbsp%3B%3CEM%3E%3CSTRONG%3E%3CFONT%20color%3D%22%23800080%22%3E%5BNew!%5D%3C%2FFONT%3E%3C%2FSTRONG%3E%3C%2FEM%3E%3C%2FTD%3E%0A%3CTD%20height%3D%2274px%22%3EThis%20article%20steps%20through%20how%20to%20integrate%20Azure%20information%20Protection%20with%20%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E.%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20height%3D%2256px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_0-1631725316135.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310625i91572D49BDA0DE80%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_0-1631725316135.png%22%20alt%3D%22CTang885_0-1631725316135.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%20%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmicrosoft-365%2Fsecurity%2Foffice-365-security%2Fmcas-saas-access-policies%3Fview%3Do365-worldwide%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3ERecommended%20Microsoft%20Defender%20for%20Cloud%20Apps%20policies%20for%20SaaS%20apps%20-%20Microsoft%20365%20Enterprise%20-%20Office%20365%3C%2FA%3E%26nbsp%3B%26nbsp%3B%3CFONT%20color%3D%22%23800080%22%3E%3CEM%3E%3CSTRONG%3E%5BNew!%5D%3C%2FSTRONG%3E%3C%2FEM%3E%3C%2FFONT%3E%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%26nbsp%3B%3C%2FTD%3E%0A%3CTD%20height%3D%2256px%22%3EThis%20article%20provides%20the%20recommended%20%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E%20policies%20to%20use%20for%20SaaS%20applications.%26nbsp%3B%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20height%3D%2256px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_2-1631688701356.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310504i0B7E984E60691F62%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_2-1631688701356.png%22%20alt%3D%22CTang885_2-1631688701356.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-security-and%2Fmcas-data-protection-blog-series-mcas-dlp-walk-through%2Fba-p%2F2169900%22%20target%3D%22_blank%22%3EMicrosoft%20Defender%20for%20Cloud%20Apps%20Data%20Protection%20Blog%20Series%3A%20Microsoft%20Defender%20for%20Cloud%20Apps%20DLP%20Walk-through%3C%2FA%3E%26nbsp%3B%26nbsp%3B%3CSTRONG%3E%3CEM%3E%3CFONT%20color%3D%22%23800080%22%3E%5BNew!%5D%26nbsp%3B%3C%2FFONT%3E%3C%2FEM%3E%3C%2FSTRONG%3E%26nbsp%3B%26nbsp%3B%3C%2FTD%3E%0A%3CTD%20height%3D%2256px%22%3EThis%20blog%20walks%20through%20how%20to%20configure%20DLP%20policies%20using%20%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E.%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20height%3D%2256px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_1-1631751626423.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310713i08C7C8D163D2F5C2%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_1-1631751626423.png%22%20alt%3D%22CTang885_1-1631751626423.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fsecurity-compliance-and-identity%2Fmcas-top-5-queries-you-need-to-save%2Fba-p%2F2274518%22%20target%3D%22_self%22%3EMCAS%3A%26nbsp%3B%20Top%205%20Queries%20you%20need%20to%20save%3C%2FA%3E%20%26nbsp%3B%3CSTRONG%3E%3CEM%3E%3CFONT%20color%3D%22%23800080%22%3E%5BNew!%5D%26nbsp%3B%3C%2FFONT%3E%3C%2FEM%3E%3C%2FSTRONG%3E%26nbsp%3B%26nbsp%3B%3C%2FTD%3E%0A%3CTD%20height%3D%2256px%22%3EThis%20blog%20shares%20our%20top%20five%20custom%20queries%20to%20save%20for%20the%20five%20use%20cases.%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3C%2FTBODY%3E%0A%3C%2FTABLE%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH3%20id%3D%22toc-hId--1895664236%22%20id%3D%22toc-hId--1891727824%22%3E%3CSTRONG%3EModule%204.%26nbsp%3BThreat%20Detection%3C%2FSTRONG%3E%3C%2FH3%3E%0A%3CTABLE%20style%3D%22height%3A%20382px%3B%20width%3A%20100%25%3B%22%20border%3D%221%22%20width%3D%22100%25%22%3E%0A%3CTBODY%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2229px%22%3E%3CP%3E%3CSTRONG%3ETraining%20Title%3C%2FSTRONG%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2229px%22%3E%3CP%3E%26nbsp%3B%3CSTRONG%3EDescription%3C%2FSTRONG%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2229px%22%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_0-1631725316135.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310625i91572D49BDA0DE80%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_0-1631725316135.png%22%20alt%3D%22CTang885_0-1631725316135.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fcloud-app-security%2Fpolicies-threat-protection%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3E%20Threat%20Detection%20Policies%3C%2FA%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2229px%22%3E%3CP%3EThis%20article%20shows%20you%20how%20to%20create%20threat%20protection%20policies%20within%20your%20%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%26nbsp%3B%3C%2FSPAN%3Eenvironment.%26nbsp%3B%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2229px%22%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_0-1631725316135.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310625i91572D49BDA0DE80%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_0-1631725316135.png%22%20alt%3D%22CTang885_0-1631725316135.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure-advanced-threat-protection%2Fmcas-integration%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EHow%20Microsoft%20Defender%20for%20identity%20integrates%20with%20Microsoft%20Defender%20for%20Cloud%20Apps%3C%2FA%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2229px%22%3EThis%20article%20is%20designed%20to%20help%20you%20understand%20and%20navigate%20the%20enhanced%20investigation%20experience%20in%20%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E%20and%20MDL%26nbsp%3B%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2229px%22%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_0-1631748312424.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310711iE364068BD02426E2%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_0-1631748312424.png%22%20alt%3D%22CTang885_0-1631748312424.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DxQzzXQU_7AU%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3E%20Microsoft%20Defender%20for%20Identity%20Overview%3C%2FA%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2229px%22%3EThis%20video%20provides%20an%20overview%20of%20MDI%20capability%26nbsp%3B%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20height%3D%22202px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_1-1631836383855.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310908i4BA450DD40848E76%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_1-1631836383855.png%22%20alt%3D%22CTang885_1-1631836383855.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fsecurity-compliance-and-identity%2Fmicrosoft-defender-for-identity-ninja-training%2Fba-p%2F2117904%22%20target%3D%22_blank%22%3EMicrosoft%20Defender%20for%20Identity%20Ninja%20Training%3C%2FA%3E%3C%2FTD%3E%0A%3CTD%20height%3D%22202px%22%3E%26nbsp%3BThis%20blog%20provides%20information%20on%20where%20you%20learn%20more%20about%20Microsoft%20Defender%20for%20Identity%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2229px%22%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_0-1631834559565.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310901i124DDE2742CC7C6E%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_0-1631834559565.png%22%20alt%3D%22CTang885_0-1631834559565.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fmslearn.cloudguides.com%2Fen-us%2Fguides%2FDetect%2520threats%2520and%2520manage%2520alerts%2520with%2520Microsoft%2520Cloud%2520App%2520Security%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EDetect%20Threats%20and%20Microsoft%20Alerts%3C%2FA%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2229px%22%3EThis%20interactive%20guide%20shows%20you%20the%20steps%20on%20how%20to%20manage%20threats%20in%20%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E.%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2229px%22%3E%3CP%3E%3CSTRONG%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_0-1631748312424.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310711iE364068BD02426E2%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_0-1631748312424.png%22%20alt%3D%22CTang885_0-1631748312424.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FSTRONG%3E%26nbsp%3B%20%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fvideoplayer%2Fembed%2FRWFISa%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EMicrosoft%20365%20Defender%20-%20Hunting%20with%20Microsoft%20Defender%20for%20Cloud%20Apps%20data%3C%2FA%3E%26nbsp%3B%3CFONT%20color%3D%22%23800080%22%3E%3CEM%3E%3CSTRONG%3E%5BNew!%5D%3C%2FSTRONG%3E%3C%2FEM%3E%3C%2FFONT%3E%26nbsp%3B%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2229px%22%3EThis%20video%20steps%20you%20through%20how%20to%20use%20the%20advanced%20hunting%20capability%20to%20investigate%20incidence%20using%20%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E.%26nbsp%3B%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3C%2FTBODY%3E%0A%3C%2FTABLE%3E%0A%3CH2%20class%3D%22lia-message-body-wrapper%20lia-component-message-view-widget-body%22%20id%3D%22toc-hId-462765878%22%20id%3D%22toc-hId-466702290%22%3E%3CA%20title%3D%22MCAS%20Intermediate%20Knowledge%20Check%22%20href%3D%22https%3A%2F%2Fforms.office.com%2FPages%2FResponsePage.aspx%3Fid%3Dv4j5cvGGr0GRqy180BHbR5ux0wrHAn9NiZHjg_f7qV9UNlpRNUlLU1owV0lSWEY2SUhaM01CTjAzTS4u%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-left%22%20image-alt%3D%22CTang885_1-1631773341527.png%22%20style%3D%22width%3A%20102px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310743i07EE7B080B224DAC%2Fimage-dimensions%2F102x115%3Fv%3Dv2%22%20width%3D%22102%22%20height%3D%22115%22%20role%3D%22button%22%20title%3D%22CTang885_1-1631773341527.png%22%20alt%3D%22CTang885_1-1631773341527.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FA%3E%3CSTRONG%3E%3CFONT%20size%3D%226%22%3E%3CA%20style%3D%22font-family%3A%20inherit%3B%20background-color%3A%20%23ffffff%3B%22%20href%3D%22https%3A%2F%2Fforms.office.com%2FPages%2FResponsePage.aspx%3Fid%3Dv4j5cvGGr0GRqy180BHbR5ux0wrHAn9NiZHjg_f7qV9UNlpRNUlLU1owV0lSWEY2SUhaM01CTjAzTS4u%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EKnowledge%20Check%20-%20Microsoft%20Defender%20for%20Cloud%20Apps%20Intermediate%3C%2FA%3E%3C%2FFONT%3E%3C%2FSTRONG%3E%3CSTRONG%20style%3D%22color%3A%20inherit%3B%20font-family%3A%20inherit%3B%22%3E%3CSPAN%20style%3D%22color%3A%20inherit%3B%20font-family%3A%20inherit%3B%22%3E%3CFONT%20size%3D%226%22%3E%26nbsp%3B%3C%2FFONT%3E%3C%2FSPAN%3E%3C%2FSTRONG%3E%3C%2FH2%3E%0A%3CP%20data-unlink%3D%22true%22%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20data-unlink%3D%22true%22%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20data-unlink%3D%22true%22%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20data-unlink%3D%22true%22%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId--521362834%22%20data-unlink%3D%22true%22%20id%3D%22toc-hId--1344688585%22%20id%3D%22toc-hId--1340752173%22%3E%3CSTRONG%3E%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E%20-%20Advanced%20%5BExpert%20Level%5D%3C%2FSTRONG%3E%3C%2FH2%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH3%20class%3D%22lia-message-body-wrapper%20lia-component-message-view-widget-body%22%20id%3D%22toc-hId-1271906967%22%20id%3D%22toc-hId-1275843379%22%3E%3CSTRONG%3EModule%201.%20Advanced%20Level%20Overview%3C%2FSTRONG%3E%3C%2FH3%3E%0A%3CTABLE%20border%3D%221%22%20width%3D%22100%25%22%3E%0A%3CTBODY%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2229px%22%3E%3CSTRONG%3ETraining%20Title%3C%2FSTRONG%3E%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2229px%22%3E%3CSTRONG%3EDescription%3C%2FSTRONG%3E%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2256px%22%3E%26nbsp%3B%3CSTRONG%20style%3D%22font-family%3A%20inherit%3B%20background-color%3A%20transparent%3B%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_0-1631748312424.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310711iE364068BD02426E2%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_0-1631748312424.png%22%20alt%3D%22CTang885_0-1631748312424.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%26nbsp%3B%3C%2FSTRONG%3E%3CA%20style%3D%22font-family%3A%20inherit%3B%22%20href%3D%22http%3A%2F%2Faka.ms%2Fintermediatevideo%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EIntroduction%20to%20Microsoft%20Defender%20for%20Cloud%20Apps%20Advanced%20Level%20Training%3C%2FA%3E%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2256px%22%3EThis%20video%20provides%20a%20summary%20of%20what%20contents%20will%20be%20covered%20in%20the%20Advanced%20(Expert%20level)%20training.%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20height%3D%2283px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_1-1631836383855.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310908i4BA450DD40848E76%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_1-1631836383855.png%22%20alt%3D%22CTang885_1-1631836383855.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fsecurity-compliance-and-identity%2Fauto-triage-infrequent-country-alerts-using-mcas-amp-power%2Fba-p%2F1644980%22%20target%3D%22_blank%22%3EPower%20Automate%20Blog%20Series%3A%3C%2FA%3E%26nbsp%3B%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fsecurity-compliance-and-identity%2Fauto-triage-infrequent-country-alerts-using-mcas-amp-power%2Fba-p%2F1644980%22%20target%3D%22_blank%22%3EAuto-Triage%20Infrequent%20Country%20Alerts%20using%20Microsoft%20Defender%20for%20Cloud%20Apps%20%26amp%3B%20Power%20Automate%3C%2FA%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20height%3D%2283px%22%3EThis%20blog%20is%20part%20of%20the%20Power%20Automate%20Blog%20Series.%26nbsp%3B%20This%20blog%20walks%20through%20how%20to%20auto-triage%20country%20alerts%20using%20%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E%20and%20Power%20Automate.%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2283px%22%3E%3CSTRONG%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_0-1631748312424.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310711iE364068BD02426E2%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_0-1631748312424.png%22%20alt%3D%22CTang885_0-1631748312424.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%26nbsp%3B%3C%2FSTRONG%3E%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DHwFIciUHxoM%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3ETriage%20Infrequent%20County%20Alerts%20using%20Power%20Automate%20and%20Microsoft%20Defender%20for%20Cloud%20Apps%3C%2FA%3E%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2283px%22%3EThis%20video%20walks%20through%20creating%20a%20new%20Power%20Automate%20Flow%20to%20automate%20the%20triage%20of%20infrequent%20Country%20alerts%20in%20%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E%20(Threat%20Protection%20Pillar).%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20height%3D%2256px%22%3E%3CSTRONG%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_0-1631748312424.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310711iE364068BD02426E2%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_0-1631748312424.png%22%20alt%3D%22CTang885_0-1631748312424.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%26nbsp%3B%3C%2FSTRONG%3E%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DgDn7-u15t7E%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3ERequest%20user%20validation%20to%20reduce%20your%20SOC%20workloads%3C%2FA%3E%3C%2FTD%3E%0A%3CTD%20height%3D%2256px%22%3EThis%20video%20walks%20through%20how%20to%20use%20Power%20Automate%20Flow%20to%20request%20user%20validation%20for%20file%20sharing%20(Data%20Protection%20Pillar).%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20height%3D%2256px%22%3E%3CSTRONG%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_0-1631748312424.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310711iE364068BD02426E2%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_0-1631748312424.png%22%20alt%3D%22CTang885_0-1631748312424.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DHzxxcI_-7Rw%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3E%26nbsp%3B%3C%2FA%3E%3C%2FSTRONG%3E%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DHzxxcI_-7Rw%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3ERequest%20for%20Manager%20Action%20using%20Power%20Automate%20%26amp%3B%20Microsoft%20Defender%20for%20Cloud%20Apps%3C%2FA%3E%3C%2FTD%3E%0A%3CTD%20height%3D%2256px%22%3EIn%20this%20video%2C%20we%20walk%20through%20how%20to%20use%20Power%20Automate%20Flow%20to%20request%20manager%20validation%20for%20their%20team.%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20height%3D%2256px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_1-1631836383855.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310908i4BA450DD40848E76%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_1-1631836383855.png%22%20alt%3D%22CTang885_1-1631836383855.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fsecurity-compliance-and-identity%2Frequest-for-manager-action-using-mcas-amp-power-automate%2Fba-p%2F1694628%22%20target%3D%22_blank%22%3E%20Request%20for%20Manager%20Action%20%3A%20Step-by-step%20guidance%3C%2FA%3E%3C%2FTD%3E%0A%3CTD%20height%3D%2256px%22%3EThis%20blog%20outlines%20the%20steps%20and%20guidance%20on%20using%20Power%20Automate%20Flow%20to%20request%20manager%20validation%20for%20their%20team.%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20height%3D%2229px%22%3E%3CSTRONG%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_0-1631748312424.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310711iE364068BD02426E2%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_0-1631748312424.png%22%20alt%3D%22CTang885_0-1631748312424.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%26nbsp%3B%3C%2FSTRONG%3E%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DRapWRInUmHQ%26amp%3Bfeature%3Demb_title%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EAuto-disable%20malicious%20inbox%20rules%20using%20Microsoft%20Defender%20for%20Cloud%20Apps%20%26amp%3B%20Power%20Automate%3C%2FA%3E%3C%2FTD%3E%0A%3CTD%20height%3D%2229px%22%3EThis%20video%20walks%20you%20through%20a%20new%20Power%20Automate%20Flow%20on%20how%20to%20remove%20malicious%20inbox%20rules%20detected%20in%20your%20cloud%20environment.%26nbsp%3B%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3C%2FTBODY%3E%0A%3C%2FTABLE%3E%0A%3CP%20data-unlink%3D%22true%22%3E%26nbsp%3B%3C%2FP%3E%0A%3CH3%20class%3D%22MessageSubject%22%20id%3D%22toc-hId-162614445%22%20id%3D%22toc-hId-166550857%22%3E%3CSTRONG%3EModule%202.%20Non-Microsoft%20Party%20IdP%20configuration%3C%2FSTRONG%3E%3C%2FH3%3E%0A%3CTABLE%20border%3D%221%22%20width%3D%22100%25%22%3E%0A%3CTBODY%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2229px%22%3E%3CSTRONG%3ETraining%20Title%3C%2FSTRONG%3E%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2229px%22%3E%3CSTRONG%3EDescription%3C%2FSTRONG%3E%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2256px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_0-1631725316135.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310625i91572D49BDA0DE80%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_0-1631725316135.png%22%20alt%3D%22CTang885_0-1631725316135.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fcloud-app-security%2Fproxy-idp-examples%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EPingOne%3C%2FA%3E%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2256px%22%3EThis%20article%20walks%20you%20through%20integrating%20PingOne%20with%20%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E%20for%20Conditional%20Access%20App%20Control%20using%20Salesforce%20as%20an%20example.%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2256px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_0-1631725316135.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310625i91572D49BDA0DE80%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_0-1631725316135.png%22%20alt%3D%22CTang885_0-1631725316135.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fcloud-app-security%2Fproxy-idp-adfs%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EADFS%3C%2FA%3E%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2256px%22%3EThis%20article%20walks%20you%20through%20integrating%20ADFS%20with%20%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E%20for%20Conditional%20Access%20App%20Control%20using%20Salesforce%20as%20an%20example.%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2256px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_0-1631725316135.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310625i91572D49BDA0DE80%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_0-1631725316135.png%22%20alt%3D%22CTang885_0-1631725316135.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fcloud-app-security%2Fproxy-idp-okta%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EOkta%3C%2FA%3E%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2256px%22%3EThis%20article%20walks%20you%20through%20integrating%20Okta%20with%20%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E%20for%20Conditional%20Access%20App%20Control%20using%20Salesforce%20as%20an%20example.%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3C%2FTBODY%3E%0A%3C%2FTABLE%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH3%20id%3D%22toc-hId--1644840018%22%20id%3D%22toc-hId--1640903606%22%3E%3CSTRONG%3EModule%203.%20Conditional%20Access%20App%20Control%20Steps%20for%20non-Microsoft%20SAAS%20applications%3C%2FSTRONG%3E%3C%2FH3%3E%0A%3CTABLE%20border%3D%221%22%20width%3D%22100%25%22%3E%0A%3CTBODY%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2229px%22%3E%3CSTRONG%3ETraining%20Title%3C%2FSTRONG%3E%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2229px%22%3E%3CSTRONG%3EDescription%3C%2FSTRONG%3E%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2229px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_0-1631748312424.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310711iE364068BD02426E2%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_0-1631748312424.png%22%20alt%3D%22CTang885_0-1631748312424.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%20%3CA%20title%3D%22Workplace%20for%20Facebook%22%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DS-Q44fMOSLk%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EWorkplace%20for%20Facebook%3A%20Block%2FApply%20DLP%20downloaded%20files%20in%20Workplace%20from%20Facebook%20with%20Microsoft%20Defender%20for%20Cloud%20Apps%20(CASB)%3C%2FA%3E%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2229px%22%3EThis%20video%20steps%20through%20how%20to%20use%20Conditional%20Access%20App%20Control%20in%20%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E%20for%20Workplace%20for%20Facebook.%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2229px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_0-1631748312424.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310711iE364068BD02426E2%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_0-1631748312424.png%22%20alt%3D%22CTang885_0-1631748312424.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%20%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DZ1wYE9xyOIM%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3E%3CSTRONG%3EBox%3C%2FSTRONG%3E%3C%2FA%3E%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2229px%22%3EThis%20video%20steps%20through%20how%20to%20use%20Conditional%20Access%20App%20Control%20in%20%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E%20for%20Box.%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2229px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_1-1631836383855.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310908i4BA450DD40848E76%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_1-1631836383855.png%22%20alt%3D%22CTang885_1-1631836383855.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fsecurity-compliance-and-identity%2Fmcas-data-protection-blog-series-box-real-time-protections%2Fba-p%2F1943256%22%20target%3D%22_blank%22%3EMicrosoft%20Defender%20for%20Cloud%20Apps%20Data%20Protection%20Blog%20Series%3A%20Box%20Real-Time%20Protections%3C%2FA%3E%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2229px%22%3EThis%20blog%20provides%20additional%20guidance%20on%20real-time%20protection%20for%20Box.%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20height%3D%2229px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_0-1631748312424.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310711iE364068BD02426E2%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_0-1631748312424.png%22%20alt%3D%22CTang885_0-1631748312424.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%3CA%20title%3D%22Slack%3A%20Block%20chats%20with%20sensitive%20data%20using%20Microsoft%20Defender%20for%20Cloud%20Apps%22%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DGpDtEo3HeKI%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3E%20Slack%3A%26nbsp%3BBlock%20chats%20with%20sensitive%20data%20using%20Microsoft%20Defender%20for%20Cloud%20Apps%3C%2FA%3E%3C%2FTD%3E%0A%3CTD%20height%3D%2229px%22%3EThis%20video%20steps%20through%20how%20to%20block%20chats%20with%20sensitive%20data%20using%20Conditional%20Access%20APP%20Control%20in%20%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E.%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3C%2FTBODY%3E%0A%3C%2FTABLE%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH3%20id%3D%22toc-hId-842672815%22%20id%3D%22toc-hId-846609227%22%3E%3CSTRONG%3EModule%204.%20SIEM%20integration%3C%2FSTRONG%3E%3C%2FH3%3E%0A%3CTABLE%20border%3D%221%22%20width%3D%22100%25%22%3E%0A%3CTBODY%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2229px%22%3E%3CSTRONG%3ETraining%20Title%3C%2FSTRONG%3E%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2229px%22%3E%3CSTRONG%3EDescription%3C%2FSTRONG%3E%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2229px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_0-1631748312424.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310711iE364068BD02426E2%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_0-1631748312424.png%22%20alt%3D%22CTang885_0-1631748312424.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%26nbsp%3B%3CA%20class%3D%22Hyperlink%20%20BCX8%20SCXO3873657%22%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DNsgpvNRsscg%22%20target%3D%22_blank%22%20rel%3D%22noreferrer%20noopener%20nofollow%22%3E%3CSPAN%20class%3D%22TextRun%20%20BCX8%20SCXO3873657%22%20data-contrast%3D%22auto%22%3E%3CSPAN%20class%3D%22NormalTextRun%20%20BCX8%20SCXO3873657%22%3EConnect%20Azure%20Sentinel%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FA%3E%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2229px%22%3EThis%20video%20details%20how%20to%20connect%20Azure%20Sentinel%20(Microsoft's%20SIEM%20%2B%20SOAR%20product)%20to%20%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E.%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2229px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_0-1631748312424.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310711iE364068BD02426E2%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_0-1631748312424.png%22%20alt%3D%22CTang885_0-1631748312424.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%26nbsp%3B%3CA%20class%3D%22Hyperlink%20%20BCX8%20SCXO162441285%22%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DYZr-New3yCI%26amp%3Bab_channel%3DSebastienMolendijk%22%20target%3D%22_blank%22%20rel%3D%22noreferrer%20noopener%20nofollow%22%3E%3CSPAN%20class%3D%22TextRun%20%20BCX8%20SCXO162441285%22%20data-contrast%3D%22auto%22%3E%3CSPAN%20class%3D%22NormalTextRun%20%20BCX8%20SCXO162441285%22%3EAzure%20Sentinel%20Entities%20Enrichment%20(Users)%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FA%3E%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2229px%22%3EThis%20video%20looks%20at%20how%20you%20can%20use%20the%20provided%20playbooks%20to%20enrich%20your%20impacted%20user%20profiles%2C%20and%20then%20consume%20it%20in%20Sentinel%2C%20ServiceNow%2C%20or%20Postman.%26nbsp%3B%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2229px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_0-1631748312424.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310711iE364068BD02426E2%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_0-1631748312424.png%22%20alt%3D%22CTang885_0-1631748312424.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%26nbsp%3B%3CA%20class%3D%22Hyperlink%20%20BCX8%20SCXO103806654%22%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3Dql8x4rC6m9A%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20nofollow%22%3EMicrosoft%20Defender%20for%20Cloud%20Apps%20Infrequent%20Country%20triage%20with%20Microsoft%20Sentinel%20and%20Logic%20Apps%3C%2FA%3E%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2229px%22%3EThis%20video%20walks%20you%20through%20the%20deployment%20of%20a%20playbook%20to%20use%20to%20triage%20your%20Microsoft%20Sentinel%20incidents.%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20height%3D%2229px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_0-1631748312424.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310711iE364068BD02426E2%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_0-1631748312424.png%22%20alt%3D%22CTang885_0-1631748312424.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%26nbsp%3B%3CA%20class%3D%22Hyperlink%20%20BCX8%20SCXO25894092%22%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DY9-PCEdkxJg%22%20target%3D%22_blank%22%20rel%3D%22noreferrer%20noopener%20nofollow%22%3E%3CSPAN%20class%3D%22TextRun%20%20BCX8%20SCXO25894092%22%20data-contrast%3D%22auto%22%3E%3CSPAN%20class%3D%22NormalTextRun%20%20BCX8%20SCXO25894092%22%3EConnect%20a%203%3C%2FSPAN%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22TextRun%20%20BCX8%20SCXO25894092%22%20data-contrast%3D%22auto%22%3E%3CSPAN%20class%3D%22NormalTextRun%20Superscript%20%20BCX8%20SCXO25894092%22%20data-fontsize%3D%2211%22%3Erd%3C%2FSPAN%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22TextRun%20%20BCX8%20SCXO25894092%22%20data-contrast%3D%22auto%22%3E%3CSPAN%20class%3D%22NormalTextRun%20%20BCX8%20SCXO25894092%22%3E%E2%80%AFParty%20SIEM%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FA%3E%3C%2FTD%3E%0A%3CTD%20height%3D%2229px%22%3EThis%20video%20details%20how%20to%20connect%20to%20third-party%20SIEM%20to%20%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E.%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3C%2FTBODY%3E%0A%3C%2FTABLE%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH3%20id%3D%22toc-hId--964781648%22%20id%3D%22toc-hId--960845236%22%3E%3CSTRONG%3EModule%205.%20Advanced%20Scenarios%20and%20Guidance%3C%2FSTRONG%3E%3C%2FH3%3E%0A%3CTABLE%20border%3D%221%22%20width%3D%22100%25%22%3E%0A%3CTBODY%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2229px%22%3E%3CSTRONG%3ETraining%20Title%3C%2FSTRONG%3E%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2229px%22%3E%3CSTRONG%3EDescription%3C%2FSTRONG%3E%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2229px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_0-1631748312424.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310711iE364068BD02426E2%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_0-1631748312424.png%22%20alt%3D%22CTang885_0-1631748312424.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%26nbsp%3B%3CA%20class%3D%22Hyperlink%20%20BCX8%20SCXO10434486%22%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DUAbLyEVCGGg%22%20target%3D%22_blank%22%20rel%3D%22noreferrer%20noopener%20nofollow%22%3E%3CSPAN%20class%3D%22TextRun%20%20BCX8%20SCXO10434486%22%20data-contrast%3D%22auto%22%3E%3CSPAN%20class%3D%22NormalTextRun%20%20BCX8%20SCXO10434486%22%3EIndicators%20of%20Compromise%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FA%3E%3CSPAN%20class%3D%22TextRun%20%20BCX8%20SCXO10434486%22%20data-contrast%3D%22none%22%3E%3CSPAN%20class%3D%22NormalTextRun%20%20BCX8%20SCXO10434486%22%3E%E2%80%AF%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2229px%22%3EThis%20video%20walks%20you%20through%20how%20to%20create%20custom%20Indicators%20of%20Compromise%20in%20%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E.%26nbsp%3B%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2229px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_0-1631748312424.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310711iE364068BD02426E2%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_0-1631748312424.png%22%20alt%3D%22CTang885_0-1631748312424.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%26nbsp%3B%3CA%20class%3D%22Hyperlink%20%20BCX8%20SCXO255863213%22%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DV2HwDfoSA5w%26amp%3Blist%3DPLhTS5hnNCfqdxyqr9JOMifwk_cZmBBz9Z%26amp%3Bindex%3D15%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20nofollow%22%3EMicrosoft%20Defender%20for%20Cloud%20Apps%20and%20Microsoft%20Threat%20Protection%3C%2FA%3E%3CSPAN%20class%3D%22TextRun%20%20BCX8%20SCXO255863213%22%20data-contrast%3D%22none%22%3E%3CSPAN%20class%3D%22NormalTextRun%20%20BCX8%20SCXO255863213%22%3E%E2%80%AF%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2229px%22%3EThis%20video%20guides%20you%20on%20how%20Microsoft%20is%20unifying%20our%20threat%20products.%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2229px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_0-1631748312424.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310711iE364068BD02426E2%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_0-1631748312424.png%22%20alt%3D%22CTang885_0-1631748312424.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%26nbsp%3B%3CA%20class%3D%22Hyperlink%20%20BCX8%20SCXO61351158%22%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3D_fQJ7oms5vQ%26amp%3Bfeature%3Dyoutu.be%26amp%3B_lrsc%3D48ea0e28-85f6-4da6-8a0b-668efd3d5279%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20nofollow%22%3EBlock%20Apps%2FSites%20on%20iOS%20(Defender%20for%20Endpoint%20%2B%20Microsoft%20Defender%20for%20Cloud%20Apps)%3C%2FA%3E%3CSPAN%20class%3D%22TextRun%20%20BCX8%20SCXO61351158%22%20data-contrast%3D%22none%22%3E%3CSPAN%20class%3D%22NormalTextRun%20%20BCX8%20SCXO61351158%22%3E%E2%80%AF%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2229px%22%3EThis%20video%20walks%20through%20blocking%20apps%20and%20sites%20on%20iOS%2C%20suing%20Defender%20for%20iOS%2C%20and%20using%20custom%20indicators%20of%20compromise%20from%20%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E%20and%20Defender%20for%20Endpoint%20integration.%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20height%3D%2229px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_0-1631725316135.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310625i91572D49BDA0DE80%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_0-1631725316135.png%22%20alt%3D%22CTang885_0-1631725316135.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%26nbsp%3B%3CA%20class%3D%22Hyperlink%20%20BCX8%20SCXO207804717%22%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fcloud-app-security%2Fapi-introduction%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EMicrosoft%20Defender%20for%20Cloud%20Apps%20API%20Documentation%3C%2FA%3E%3CSPAN%20class%3D%22TextRun%20%20BCX8%20SCXO207804717%22%20data-contrast%3D%22none%22%3E%3CSPAN%20class%3D%22NormalTextRun%20%20BCX8%20SCXO207804717%22%3E%E2%80%AF%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FTD%3E%0A%3CTD%20height%3D%2229px%22%3EThis%20article%20describes%20how%20to%20interact%20with%20%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E%20over%20HTTPS.%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20height%3D%2229px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_0-1631725316135.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310625i91572D49BDA0DE80%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_0-1631725316135.png%22%20alt%3D%22CTang885_0-1631725316135.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%26nbsp%3B%3CA%20class%3D%22Hyperlink%20%20BCX8%20SCXO198177211%22%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fcloud-app-security%2Flog-collector-advanced-management%23enable-the-log-collector-behind-a-proxy%22%20target%3D%22_blank%22%20rel%3D%22noreferrer%20noopener%22%3E%3CSPAN%20class%3D%22TextRun%20%20BCX8%20SCXO198177211%22%20data-contrast%3D%22auto%22%3E%3CSPAN%20class%3D%22NormalTextRun%20%20BCX8%20SCXO198177211%22%3EConfiguring%20a%20Log%20Collector%20behind%20a%20Proxy%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FA%3E%3CSPAN%20class%3D%22TextRun%20%20BCX8%20SCXO198177211%22%20data-contrast%3D%22none%22%3E%3CSPAN%20class%3D%22NormalTextRun%20%20BCX8%20SCXO198177211%22%3E%E2%80%AF%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FTD%3E%0A%3CTD%20height%3D%2229px%22%3EThis%20article%20provides%20more%20information%20on%20configurations%20to%20ensure%20your%20log%20collector%20works%20when%20behind%20a%20proxy.%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20height%3D%2229px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_2-1631743975895.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310701i53582AC43633EA6A%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_2-1631743975895.png%22%20alt%3D%22CTang885_2-1631743975895.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%26nbsp%3B%3CA%20class%3D%22Hyperlink%20%20BCX8%20SCXO101615280%22%20href%3D%22https%3A%2F%2Fmslearn.cloudguides.com%2Fen-us%2Fguides%2FAutomate%2520alerts%2520management%2520with%2520Microsoft%2520Power%2520Automate%2520and%2520Cloud%2520App%2520Security%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20nofollow%22%3EAutomate%20Microsoft%20Defender%20for%20Cloud%20Apps%20Alerts%20with%20Power%20Automate%3C%2FA%3E%3C%2FTD%3E%0A%3CTD%20height%3D%2229px%22%3EThis%20interactive%20guide%20walks%20through%20the%20steps%20needed%20to%20automate%20alert%20management%20using%20Power%20Automate%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20height%3D%2256px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_1-1631836383855.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310908i4BA450DD40848E76%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_1-1631836383855.png%22%20alt%3D%22CTang885_1-1631836383855.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%3CA%20class%3D%22Hyperlink%20SCXO200798987%20BCX8%22%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-365-defender%2Fmicrosoft-cloud-app-security-the-hunt-in-a-multi-stage-incident%2Fba-p%2F2193484%22%20target%3D%22_blank%22%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3A%26nbsp%3B%20The%20Hunt%20in%20a%20multi-stage%20incident%3C%2FA%3E%26nbsp%3B%3CFONT%20color%3D%22%23800080%22%3E%3CEM%3E%3CSTRONG%3E%5BNew!%5D%26nbsp%3B%3C%2FSTRONG%3E%3C%2FEM%3E%3C%2FFONT%3E%3C%2FTD%3E%0A%3CTD%20height%3D%2256px%22%3EThis%20blog%20explains%20how%20to%20use%20Microsoft%20365%20Defender%20to%20address%20common%20alerts%20from%20%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E%20to%20determine%20the%20threats'%20scope%20and%20impact.%26nbsp%3B%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20height%3D%2229px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_0-1631725316135.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310625i91572D49BDA0DE80%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_0-1631725316135.png%22%20alt%3D%22CTang885_0-1631725316135.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%20%3CA%20class%3D%22Hyperlink%20SCXO68234344%20BCX8%22%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-365-defender%2Fmicrosoft-cloud-app-security-the-hunt-for-insider-risk%2Fba-p%2F2346242%22%20target%3D%22_blank%22%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3A%20The%20Hunt%20for%20Insider%20Risk%26nbsp%3B%3C%2FA%3E%26nbsp%3B%20%26nbsp%3B%3CFONT%20color%3D%22%23800080%22%3E%3CEM%3E%3CSTRONG%3E%5BNew!%5D%26nbsp%3B%26nbsp%3B%3C%2FSTRONG%3E%3C%2FEM%3E%3C%2FFONT%3E%3C%2FTD%3E%0A%3CTD%20height%3D%2229px%22%3EThis%20blog%20outlines%20the%20use%20cases%20for%20using%20Microsoft%20365%20Defender%20to%20determine%20the%20%22Insider%20Risk%22%20alerts%20from%20%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E.%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20height%3D%2229px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_0-1631725316135.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310625i91572D49BDA0DE80%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_0-1631725316135.png%22%20alt%3D%22CTang885_0-1631725316135.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%20%3CA%20class%3D%22Hyperlink%20SCXO19641217%20BCX8%22%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmicrosoft-365%2Fsecurity%2Fdefender%2Fadvanced-hunting-overview%3Fview%3Do365-worldwide%22%20target%3D%22_blank%22%20rel%3D%22noreferrer%20noopener%22%3E%3CSPAN%20class%3D%22TextRun%20SCXO19641217%20BCX8%22%20data-contrast%3D%22auto%22%3E%3CSPAN%20class%3D%22NormalTextRun%20SCXO19641217%20BCX8%22%3EProactively%20hunt%20for%20threats%20with%20advanced%20hunting%20in%20Microsoft%20365%20Defender%26nbsp%3B%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FA%3E%3CFONT%20color%3D%22%23800080%22%3E%3CEM%3E%3CSTRONG%3E%5BNew!%5D%26nbsp%3B%3C%2FSTRONG%3E%3C%2FEM%3E%3C%2FFONT%3E%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%3C%2FTD%3E%0A%3CTD%20height%3D%2229px%22%3EThis%20article%20shows%20how%20to%20proactively%20hunt%20for%20threats%20using%20the%20Advance%20Hunting%20Tool%20in%20Microsoft%20365%20Defender.%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20height%3D%2229px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_1-1631836383855.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310908i4BA450DD40848E76%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_1-1631836383855.png%22%20alt%3D%22CTang885_1-1631836383855.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%26nbsp%3B%3CA%20class%3D%22Hyperlink%20SCXO255304814%20BCX8%22%20href%3D%22https%3A%2F%2Fgithub.com%2Fmicrosoft%2FMicrosoft-365-Defender-Hunting-Queries%22%20target%3D%22_blank%22%20rel%3D%22noreferrer%20noopener%22%3E%3CSPAN%20class%3D%22TextRun%20Highlight%20SCXO255304814%20BCX8%22%20data-contrast%3D%22none%22%3E%3CSPAN%20class%3D%22NormalTextRun%20SCXO255304814%20BCX8%22%3EGitHub%20-%20Microsoft%2FMicrosoft-365-Defender-Hunting-Queries%3A%20Sample%20queries%20for%20Advanced%20hunting%20in%20Microsoft%20365%20Defender%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FA%3E%20%26nbsp%3B%20%26nbsp%3B%3CFONT%20color%3D%22%23800080%22%3E%3CEM%3E%3CSTRONG%3E%5BNew!%5D%26nbsp%3B%3C%2FSTRONG%3E%3C%2FEM%3E%3C%2FFONT%3E%26nbsp%3B%26nbsp%3B%3C%2FTD%3E%0A%3CTD%20height%3D%2229px%22%3EThis%20blog%20provides%20a%20list%20of%20sample%20queries%20for%20Advance%20Hunting%20using%20Microsoft%20365%20Defender.%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3C%2FTBODY%3E%0A%3C%2FTABLE%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH3%20id%3D%22toc-hId-1522731185%22%20id%3D%22toc-hId-1526667597%22%3E%3CSTRONG%3EModule%206.%26nbsp%3B%20Additional%20Blogs%20and%20Information%3C%2FSTRONG%3E%3C%2FH3%3E%0A%3CTABLE%20border%3D%221%22%20width%3D%22100%25%22%3E%0A%3CTBODY%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2230px%22%3E%3CSTRONG%3ETraining%20Title%3C%2FSTRONG%3E%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2230px%22%3E%3CSTRONG%3EDescription%3C%2FSTRONG%3E%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%22109px%22%3E%3CP%3E%3CSPAN%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_1-1631836383855.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310908i4BA450DD40848E76%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_1-1631836383855.png%22%20alt%3D%22CTang885_1-1631836383855.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%26nbsp%3B%3C%2FSPAN%3E%3CA%20style%3D%22font-family%3A%20inherit%3B%22%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-security-and%2Fsecuring-administrative-access-to-microsoft-cloud-app-security%2Fba-p%2F1754139%22%20target%3D%22_blank%22%3ESecuring%20Administrative%20Access%20to%20Microsoft%20Defender%20for%20Cloud%20Apps%20and%20Defender%20for%20Identities%3C%2FA%3E%3CSPAN%20style%3D%22font-family%3A%20inherit%3B%20background-color%3A%20transparent%3B%22%20data-contrast%3D%22none%22%3E%E2%80%AF%3C%2FSPAN%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%22109px%22%3EThis%20blog%20provides%20guidance%20on%20how%20to%20configure%20Azure%20AD%20Conditional%20Access%20to%20secure%20administrative%20access%20to%20%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E%20and%20Defender%20for%20Identity%20(Formerly%20Azure%20ATP)%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2283px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_1-1631836383855.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310908i4BA450DD40848E76%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_1-1631836383855.png%22%20alt%3D%22CTang885_1-1631836383855.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%26nbsp%3B%3CA%20class%3D%22Hyperlink%20SCXO77788109%20BCX8%22%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-security-and%2Fsecurity-admins-mcas-and-block%2Fba-p%2F1777167%23%3A~%3Atext%3DAs%2520you%2520may%2520know%252C%2520access%2520to%2520MCAS%2520can%2Con%2520overall%2520MCAS%2520RBAC%252C%2520check%2520out%2520our%2520documentation%2521%22%20target%3D%22_blank%22%3ELimiting%20Inherited%20Roles%20from%20Azure%20Active%20Directory%20in%20Microsoft%20Defender%20for%20Cloud%20Apps%3C%2FA%3E%3CSPAN%20class%3D%22TextRun%20SCXO77788109%20BCX8%22%20data-contrast%3D%22none%22%3E%3CSPAN%20class%3D%22NormalTextRun%20SCXO77788109%20BCX8%22%3E%E2%80%AF%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2283px%22%3EThis%20blog%20goes%20over%20a%20customer%20scenario%20for%20%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E%20and%20the%20steps%20that%20can%20be%20taken%20to%20meet%20their%20requirements%20on%20limiting%20inherited%20AAD%20roles'%20accesses%20in%20%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E.%26nbsp%3B%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2229px%22%3E%3CFONT%20size%3D%223%22%3E%E2%A4%B4%26nbsp%3B%20%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Flearn%2Fbrowse%2F%3Fproducts%3Dm365-ems-cloud-app-security%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EMicrosoft%20Defender%20for%20Cloud%20Apps%20Learning%20Path%3C%2FA%3E%3C%2FFONT%3E%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%2229px%22%3ECheck%20out%20these%20learning%20paths%20for%20%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20height%3D%2256px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_1-1631836383855.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310908i4BA450DD40848E76%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_1-1631836383855.png%22%20alt%3D%22CTang885_1-1631836383855.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fcloud-app-security%2Flifecycle-management%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3ELifecycle%20management%20strategy%20%7C%20Microsoft%20Docs%3C%2FA%3E%3C%2FTD%3E%0A%3CTD%20height%3D%2256px%22%3EThis%20blog%20provides%20information%20on%20%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E%20Lifecycle%20Management%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20height%3D%2256px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_1-1631836383855.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310908i4BA450DD40848E76%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_1-1631836383855.png%22%20alt%3D%22CTang885_1-1631836383855.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fsecurity-compliance-and-identity%2Fbypass-blocking-pdf-previews-in-owa%2Fba-p%2F2194205%22%20target%3D%22_blank%22%3EBypass%20Blocking%20PDF%20Preview%20in%20OWA%3C%2FA%3E%26nbsp%3B%3CFONT%20color%3D%22%23800080%22%3E%3CEM%3E%3CSTRONG%3E%5BNew!%5D%3C%2FSTRONG%3E%3C%2FEM%3E%3C%2FFONT%3E%3C%2FTD%3E%0A%3CTD%20height%3D%2256px%22%3EThis%20blogs%20walks%20through%20use%20cases%20on%20using%20the%20%22Real-Time%20Control%22%20in%20%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E%20to%20bypass%20blocking%20PDF%20previews%20in%20OWA.%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20height%3D%2229px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CTang885_0-1631725316135.png%22%20style%3D%22width%3A%20200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310625i91572D49BDA0DE80%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22CTang885_0-1631725316135.png%22%20alt%3D%22CTang885_0-1631725316135.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fcloud-app-security%2Ftutorial-step-up-authentication%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3ETutorial%3A%26nbsp%3B%20Require%20step-up%20authentication%20(authentication%20context)%20upon%20risky%20actions%26nbsp%3B%3C%2FA%3E%20%26nbsp%3B%3CFONT%20color%3D%22%23800080%22%3E%3CEM%3E%3CSTRONG%3E%5BNew!%5D%3C%2FSTRONG%3E%3C%2FEM%3E%3C%2FFONT%3E%3C%2FTD%3E%0A%3CTD%20height%3D%2229px%22%3EIn%20this%20tutorial%2C%20we%20will%20show%20you%20how%20to%20protect%20your%20organization%20by%20requiring%20Azure%20AD%20Conditional%20Policies%20to%20be%20accessed%20during%20sensitive%20session%20actions%20using%20%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps'%3C%2FSPAN%3E%20Conditional%20Access%20Control.%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3C%2FTBODY%3E%0A%3C%2FTABLE%3E%0A%3CP%20data-unlink%3D%22true%22%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20class%3D%22lia-message-body-wrapper%20lia-component-message-view-widget-body%22%20id%3D%22toc-hId--413805997%22%20id%3D%22toc-hId--409869585%22%3E%3CA%20title%3D%22MCAS%20Advanced%20Knowledge%20Check%22%20href%3D%22https%3A%2F%2Fforms.office.com%2FPages%2FResponsePage.aspx%3Fid%3Dv4j5cvGGr0GRqy180BHbR5ux0wrHAn9NiZHjg_f7qV9UQjBZMTVEMks4NDVaOEM3TFFGWFdQQk4yTi4u%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-left%22%20image-alt%3D%22CTang885_1-1631773341527.png%22%20style%3D%22width%3A%20102px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310743i07EE7B080B224DAC%2Fimage-dimensions%2F102x115%3Fv%3Dv2%22%20width%3D%22102%22%20height%3D%22115%22%20role%3D%22button%22%20title%3D%22CTang885_1-1631773341527.png%22%20alt%3D%22CTang885_1-1631773341527.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FA%3E%26nbsp%3B%3CA%20title%3D%22Microsoft%20Defender%20for%20Cloud%20Apps%20Advanced%20Level%20Knowledge%20Check%22%20href%3D%22https%3A%2F%2Fforms.office.com%2FPages%2FResponsePage.aspx%3Fid%3Dv4j5cvGGr0GRqy180BHbR5ux0wrHAn9NiZHjg_f7qV9UQjBZMTVEMks4NDVaOEM3TFFGWFdQQk4yTi4u%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EKnowledge%20Check%20-%20Microsoft%20Defender%20for%20Cloud%20Apps%20Advanced%3C%2FA%3E%3C%2FH2%3E%0A%3CP%20data-unlink%3D%22true%22%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20data-unlink%3D%22true%22%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20data-unlink%3D%22true%22%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20data-unlink%3D%22true%22%3EOnce%20you've%20finished%20the%20training%20and%20the%20knowledge%20checks%2C%20please%20go%20to%20our%20attestation%20portal%20to%20generate%20your%20certificate%20-%26nbsp%3B%20you'll%20see%20it%20in%20your%20inbox%20within%203%20to%205%20business%20days%20(%3CFONT%20color%3D%22%230000FF%22%3E%3CA%20href%3D%22https%3A%2F%2Fforms.office.com%2FPages%2FResponsePage.aspx%3Fid%3Dv4j5cvGGr0GRqy180BHbR5bt_4Xu7FRAhgVO1UcMIgZUMDdXUFVGUFVZQjJURzBLUkVZM0s0MlRWTi4u%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3E%3CSTRONG%3EClick%20Here%3C%2FSTRONG%3E%3C%2FA%3E%3C%2FFONT%3E).%26nbsp%3B%26nbsp%3B%3C%2FP%3E%0A%3CP%20data-unlink%3D%22true%22%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20data-unlink%3D%22true%22%3EWe%20have%20a%20great%20lineup%20of%20updates%20for%20the%20next%20rendition%20(next%20quarter).%26nbsp%3B%20If%20you'd%20like%20anything%20covered%2C%20please%20comment%20below.%26nbsp%3B%20In%20addition%2C%20please%20reach%20out%20to%20us%20if%20you%20have%20any%20content%20that%20you%20would%20like%20to%20include%20as%20well.%26nbsp%3B%3C%2FP%3E%0A%3CP%20data-unlink%3D%22true%22%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20data-unlink%3D%22true%22%3E%3CFONT%20size%3D%226%22%3E%3CEM%3E%3CFONT%20color%3D%22%23800080%22%3E%3CSPAN%20class%3D%22TextRun%20SCXO150082722%20BCX8%22%20data-contrast%3D%22none%22%3E%3CSPAN%20class%3D%22NormalTextRun%20SCXO150082722%20BCX8%22%3EWe%20hope%20you%20all%20enjoy%20this%20training!%3C%2FSPAN%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22EOP%20SCXO150082722%20BCX8%22%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FFONT%3E%3C%2FEM%3E%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%20data-unlink%3D%22true%22%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20data-unlink%3D%22true%22%3E%3CFONT%20size%3D%225%22%20color%3D%22%23000000%22%3EFeedback%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3ELet%20us%20know%20if%20you%20have%20any%20feedback%20or%20relevant%20use%20cases%2Frequirements%20for%20this%20portion%20of%20%3CSPAN%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E%20by%20emailing%2C%26nbsp%3B%3CA%20class%3D%22Hyperlink%20%20BCX8%20SCXO46985034%22%20href%3D%22mailto%3Acasfeedback%40microsoft.com%22%20target%3D%22_blank%22%20rel%3D%22noreferrer%20noopener%20nofollow%22%3E%3CSPAN%20class%3D%22TextRun%20%20BCX8%20SCXO46985034%22%20data-contrast%3D%22auto%22%3E%3CSPAN%20class%3D%22NormalTextRun%20%20BCX8%20SCXO46985034%22%3ECASFeedback%40microsoft.com%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FA%3E%3CSPAN%20class%3D%22TextRun%20%20BCX8%20SCXO46985034%22%20data-contrast%3D%22none%22%3E%3CSPAN%20class%3D%22NormalTextRun%20%20BCX8%20SCXO46985034%22%3E%E2%80%AFand%20mention%20the%20core%20area%20of%20concern.%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CFONT%20size%3D%225%22%20color%3D%22%23000000%22%3ELearn%20More%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%20data-contrast%3D%22none%22%3EFor%20further%20information%20on%20how%20your%20organization%20can%20benefit%20from%20Microsoft%20Defender%20for%20Cloud%20Apps%2C%20connect%20with%20us%20at%20the%20links%20below%3A%E2%80%AF%3C%2FSPAN%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CTABLE%3E%0A%3CTBODY%3E%0A%3CTR%3E%0A%3CTD%3E%3CP%3E%3CSPAN%20data-contrast%3D%22none%22%3EJoin%20the%20conversation%20on%E2%80%AF%3C%2FSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Ftechcommunity.microsoft.com%252Ft5%252Fmicrosoft-cloud-app-security%252Fbd-p%252FMicrosoftCloudAppSecurity%26amp%3Bdata%3D04%257C01%257CSarahzin.Chowdhury%2540microsoft.com%257Cd32eea560a154850520a08d8dcde1fc0%257C72f988bf86f141af91ab2d7cd011db47%257C0%257C0%257C637502193856098348%257CUnknown%257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%253D%257C1000%26amp%3Bsdata%3DyXxIK%252B5%252FTvhVD9MNX%252BsmgunQXuQWSi3%252FqKE68%252FXIHGQ%253D%26amp%3Breserved%3D0%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3E%3CSPAN%20data-contrast%3D%22auto%22%3ETech%20Community%3C%2FSPAN%3E%3C%2FA%3E%3CSPAN%20data-contrast%3D%22none%22%3E.%E2%80%AF%E2%80%AF%3C%2FSPAN%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%20data-unlink%3D%22true%22%3E%3CSPAN%20data-contrast%3D%22none%22%3EStay%20up%20to%20date%E2%80%94subscribe%20to%20our%E2%80%AF%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fsecurity-compliance-and-identity%2Fmicrosoft-cloud-app-security-mcas-ninja-training-september-2021%2Fba-p%2F2751518%22%20target%3D%22_self%22%3Eblog%3C%2FA%3E%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22none%22%3E.%E2%80%AF%3C%2FSPAN%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%26nbsp%3B%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%3E%3CP%3E%3CSPAN%20data-contrast%3D%22none%22%3EUpload%20a%20log%20file%20from%20your%20network%20firewall%20or%20enable%20logging%20via%26nbsp%3B%3C%2FSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Fdocs.microsoft.com%252Fen-us%252Fcloud-app-security%252Fwdatp-integration%26amp%3Bdata%3D04%257C01%257CSarahzin.Chowdhury%2540microsoft.com%257Cd32eea560a154850520a08d8dcde1fc0%257C72f988bf86f141af91ab2d7cd011db47%257C0%257C0%257C637502193856118268%257CUnknown%257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%253D%257C1000%26amp%3Bsdata%3D6Hzzeof2Q5VlpGPJiyGB41k65XIN8X5%252FBuG5lRPk4AY%253D%26amp%3Breserved%3D0%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3E%3CSPAN%20data-contrast%3D%22auto%22%3EMicrosoft%20Defender%20for%20Endpoint%3C%2FSPAN%3E%3C%2FA%3E%26nbsp%3B%3CSPAN%20data-contrast%3D%22none%22%3Eto%3C%2FSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Fdocs.microsoft.com%252Fen-us%252Fcloud-app-security%252Fset-up-cloud-discovery%26amp%3Bdata%3D04%257C01%257CSarahzin.Chowdhury%2540microsoft.com%257Cd32eea560a154850520a08d8dcde1fc0%257C72f988bf86f141af91ab2d7cd011db47%257C0%257C0%257C637502193856128226%257CUnknown%257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%253D%257C1000%26amp%3Bsdata%3DIh9WcC1W%252FZC4S9N%252FJFGoT03NSrmkgFnBGmHh8hw3iZ0%253D%26amp%3Breserved%3D0%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%26nbsp%3Bdiscover%20Shadow%20IT%26nbsp%3B%3C%2FSPAN%3E%3C%2FA%3E%3CSPAN%20data-contrast%3D%22none%22%3Ein%20your%20network.%E2%80%AF%3C%2FSPAN%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%3E%3CP%3E%3CSPAN%20data-contrast%3D%22none%22%3ELearn%20more%E2%80%94download%E2%80%AF%3C%2FSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Fquery.prod.cms.rt.microsoft.com%252Fcms%252Fapi%252Fam%252Fbinary%252FRE3nibJ%26amp%3Bdata%3D04%257C01%257CSarahzin.Chowdhury%2540microsoft.com%257Cd32eea560a154850520a08d8dcde1fc0%257C72f988bf86f141af91ab2d7cd011db47%257C0%257C0%257C637502193856128226%257CUnknown%257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%253D%257C1000%26amp%3Bsdata%3DjD3hhxi0SUcxWY03YmUH4cIIgADUv2oUPf7X77uhebc%253D%26amp%3Breserved%3D0%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3E%3CSPAN%20data-contrast%3D%22auto%22%3ETop%2020%20use%20cases%20for%20CASB%3C%2FSPAN%3E%3C%2FA%3E%3CSPAN%20data-contrast%3D%22none%22%3E.%E2%80%AF%3C%2FSPAN%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Fdocs.microsoft.com%252Fen-us%252Fcloud-app-security%252Fenable-instant-visibility-protection-and-governance-actions-for-your-apps%26amp%3Bdata%3D04%257C01%257CSarahzin.Chowdhury%2540microsoft.com%257Cd32eea560a154850520a08d8dcde1fc0%257C72f988bf86f141af91ab2d7cd011db47%257C0%257C0%257C637502193856138174%257CUnknown%257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%253D%257C1000%26amp%3Bsdata%3DHpfW0RR4Sig%252FmrQkuiYim5Ab4bayvjx7%252Bak46VvFjK8%253D%26amp%3Breserved%3D0%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3E%3CSPAN%20data-contrast%3D%22auto%22%3EConnect%20your%20cloud%20apps%26nbsp%3B%3C%2FSPAN%3E%3C%2FA%3E%3CSPAN%20data-contrast%3D%22none%22%3Eto%20detect%20suspicious%20user%20activity%20and%20exposed%20sensitive%20data.%E2%80%AF%3C%2FSPAN%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%3E%3CP%3E%3CSPAN%20data-contrast%3D%22none%22%3ESearch%20documentation%20on%26nbsp%3B%3C%2FSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Fdocs.microsoft.com%252Fen-us%252Fcloud-app-security%252Fwhat-is-cloud-app-security%26amp%3Bdata%3D04%257C01%257CSarahzin.Chowdhury%2540microsoft.com%257Cd32eea560a154850520a08d8dcde1fc0%257C72f988bf86f141af91ab2d7cd011db47%257C0%257C0%257C637502193856148130%257CUnknown%257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%253D%257C1000%26amp%3Bsdata%3DcDc8w0Qn1JbDyXB4ZuZhndiJfrbYZemPISJ%252B09bVsDc%253D%26amp%3Breserved%3D0%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FA%3E%3CSPAN%20data-contrast%3D%22none%22%3E.%E2%80%AF%E2%80%AF%3C%2FSPAN%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%3E%3CP%3E%3CSPAN%20data-contrast%3D%22none%22%3EEnable%20out-of-the-box%3C%2FSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Fdocs.microsoft.com%252Fen-us%252Fcloud-app-security%252Fanomaly-detection-policy%26amp%3Bdata%3D04%257C01%257CSarahzin.Chowdhury%2540microsoft.com%257Cd32eea560a154850520a08d8dcde1fc0%257C72f988bf86f141af91ab2d7cd011db47%257C0%257C0%257C637502193856148130%257CUnknown%257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%253D%257C1000%26amp%3Bsdata%3D5E7b5d0kyBdnB0TCs0J7NtfJW8SnIJW3hNy8B8vy5fk%253D%26amp%3Breserved%3D0%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%26nbsp%3Banomaly%20detection%20policies%3C%2FSPAN%3E%3C%2FA%3E%26nbsp%3B%3CSPAN%20data-contrast%3D%22none%22%3Eand%20start%20detecting%20cloud%20threats%20in%20your%20environment.%E2%80%AF%3C%2FSPAN%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%3E%3CP%3E%3CSPAN%20data-contrast%3D%22none%22%3EUnderstand%20your%E2%80%AF%3C%2FSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Fquery.prod.cms.rt.microsoft.com%252Fcms%252Fapi%252Fam%252Fbinary%252FRE2NXYO%26amp%3Bdata%3D04%257C01%257CSarahzin.Chowdhury%2540microsoft.com%257Cd32eea560a154850520a08d8dcde1fc0%257C72f988bf86f141af91ab2d7cd011db47%257C0%257C0%257C637502193856158094%257CUnknown%257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%253D%257C1000%26amp%3Bsdata%3DdfYXq6s98LyG6eXCy5jbeArVyDOkWpNFLSUJvJWkQnQ%253D%26amp%3Breserved%3D0%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3E%3CSPAN%20data-contrast%3D%22auto%22%3Elicensing%20options%3C%2FSPAN%3E%3C%2FA%3E%3CSPAN%20data-contrast%3D%22none%22%3E%E2%80%AF.%E2%80%AF%E2%80%AF%3C%2FSPAN%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%3E%3CP%3E%3CSPAN%20data-contrast%3D%22none%22%3EContinue%20with%20more%20advanced%20use%20cases%20across%26nbsp%3B%3C%2FSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Fdocs.microsoft.com%252Fen-us%252Fcloud-app-security%252Fsession-policy-aad%26amp%3Bdata%3D04%257C01%257CSarahzin.Chowdhury%2540microsoft.com%257Cd32eea560a154850520a08d8dcde1fc0%257C72f988bf86f141af91ab2d7cd011db47%257C0%257C0%257C637502193856168046%257CUnknown%257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%253D%257C1000%26amp%3Bsdata%3DNqBRC%252FTPszasVWctbbdNlap5RyilXPVF2El9meDEIzM%253D%26amp%3Breserved%3D0%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3E%3CSPAN%20data-contrast%3D%22auto%22%3Einformation%20protection%3C%2FSPAN%3E%3C%2FA%3E%3CSPAN%20data-contrast%3D%22none%22%3E%2C%20compliance%2C%20and%20more.%E2%80%AF%3C%2FSPAN%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%3E%3CP%3E%3CSPAN%20data-contrast%3D%22none%22%3EFollow%20the%E2%80%AF%3C%2FSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Ftechcommunity.microsoft.com%252Ft5%252Fmicrosoft-security-and%252Fwelcome-to-the-mcas-ninja-blog-series%252Fba-p%252F1775379%26amp%3Bdata%3D04%257C01%257CSarahzin.Chowdhury%2540microsoft.com%257Cd32eea560a154850520a08d8dcde1fc0%257C72f988bf86f141af91ab2d7cd011db47%257C0%257C0%257C637502193856168046%257CUnknown%257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%253D%257C1000%26amp%3Bsdata%3DysAfo1Q4sPcMBjGLTVsw09bcd1TMxTK2wX%252FrB8q1p%252FI%253D%26amp%3Breserved%3D0%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EMicrosoft%20Defender%20for%20Cloud%20Apps%20Ninja%20blog%3C%2FA%3E%3CSPAN%20data-contrast%3D%22none%22%3E%E2%80%AFand%20learn%20about%E2%80%AF%3C%2FSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Ftechcommunity.microsoft.com%252Ft5%252Fmicrosoft-security-and%252Fthe-microsoft-cloud-app-security-mcas-ninja-training-is-here%252Fba-p%252F1877343%26amp%3Bdata%3D04%257C01%257CSarahzin.Chowdhury%2540microsoft.com%257Cd32eea560a154850520a08d8dcde1fc0%257C72f988bf86f141af91ab2d7cd011db47%257C0%257C0%257C637502193856177988%257CUnknown%257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%253D%257C1000%26amp%3Bsdata%3DPwKeXbwJuXI8HcaiaJx6jodMzlUZnu0wXG51boEhiNw%253D%26amp%3Breserved%3D0%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3E%3CSPAN%20data-contrast%3D%22auto%22%3ENinja%20Training%3C%2FSPAN%3E%3C%2FA%3E%3CSPAN%20data-contrast%3D%22none%22%3E.%E2%80%AF%E2%80%AF%3C%2FSPAN%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%20data-contrast%3D%22none%22%3EGo%20deeper%20with%20these%20interactive%20guides%3A%E2%80%AF%3C%2FSPAN%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%20data-contrast%3D%22none%22%3E%C2%B7%E2%80%AF%E2%80%AF%E2%80%AF%E2%80%AF%E2%80%AF%E2%80%AF%E2%80%AF%E2%80%AF%E2%80%AF%3C%2FSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Fmslearn.cloudguides.com%252Fen-us%252Fguides%252FDiscover%252520and%252520manage%252520cloud%252520app%252520usage%252520with%252520Microsoft%252520Cloud%252520App%252520Security%26amp%3Bdata%3D04%257C01%257CSarahzin.Chowdhury%2540microsoft.com%257Cd32eea560a154850520a08d8dcde1fc0%257C72f988bf86f141af91ab2d7cd011db47%257C0%257C0%257C637502193856187956%257CUnknown%257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%253D%257C1000%26amp%3Bsdata%3DiBuwo%252FWVmn4c0dpyTi0M6eV2eWOb5KwHyMrgTVNvWtk%253D%26amp%3Breserved%3D0%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3E%3CSPAN%20data-contrast%3D%22auto%22%3EDiscover%20and%20manage%20cloud%20app%20usage%3C%2FSPAN%3E%3C%2FA%3E%3CSPAN%20data-contrast%3D%22none%22%3E%E2%80%AFwith%20Microsoft%20Defender%20for%20Cloud%20Apps%E2%80%AF%3C%2FSPAN%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%20data-contrast%3D%22none%22%3E%C2%B7%E2%80%AF%E2%80%AF%E2%80%AF%E2%80%AF%E2%80%AF%E2%80%AF%E2%80%AF%E2%80%AF%E2%80%AF%3C%2FSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Fmslearn.cloudguides.com%252Fen-us%252Fguides%252FProtect%252520and%252520control%252520information%252520with%252520Microsoft%252520Cloud%252520App%252520Security%26amp%3Bdata%3D04%257C01%257CSarahzin.Chowdhury%2540microsoft.com%257Cd32eea560a154850520a08d8dcde1fc0%257C72f988bf86f141af91ab2d7cd011db47%257C0%257C0%257C637502193856187956%257CUnknown%257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%253D%257C1000%26amp%3Bsdata%3DShPKlBufwWx21pIPLQg1pJnyUu7Nb47FPQpHghNBFz4%253D%26amp%3Breserved%3D0%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3E%3CSPAN%20data-contrast%3D%22auto%22%3EProtect%20and%20control%20information%3C%2FSPAN%3E%3C%2FA%3E%3CSPAN%20data-contrast%3D%22none%22%3E%E2%80%AFwith%20Microsoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%20data-contrast%3D%22none%22%3E%C2%B7%E2%80%AF%E2%80%AF%E2%80%AF%E2%80%AF%E2%80%AF%E2%80%AF%E2%80%AF%E2%80%AF%E2%80%AF%3C%2FSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Fmslearn.cloudguides.com%252Fen-us%252Fguides%252FDetect%252520threats%252520and%252520manage%252520alerts%252520with%252520Microsoft%252520Cloud%252520App%252520Security%26amp%3Bdata%3D04%257C01%257CSarahzin.Chowdhury%2540microsoft.com%257Cd32eea560a154850520a08d8dcde1fc0%257C72f988bf86f141af91ab2d7cd011db47%257C0%257C0%257C637502193856197905%257CUnknown%257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%253D%257C1000%26amp%3Bsdata%3DjGLBskxguh%252BvClYHEbYqeC9JuNvYtT1HT8YLQsryj64%253D%26amp%3Breserved%3D0%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3E%3CSPAN%20data-contrast%3D%22auto%22%3EDetect%20threats%20and%20manage%20alerts%3C%2FSPAN%3E%3C%2FA%3E%3CSPAN%20data-contrast%3D%22none%22%3E%E2%80%AFwith%20Microsoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%20data-contrast%3D%22none%22%3E%C2%B7%E2%80%AF%E2%80%AF%E2%80%AF%E2%80%AF%E2%80%AF%E2%80%AF%E2%80%AF%E2%80%AF%E2%80%AF%3C%2FSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Fmslearn.cloudguides.com%252Fen-us%252Fguides%252FAutomate%252520alerts%252520management%252520with%252520Microsoft%252520Power%252520Automate%252520and%252520Cloud%252520App%252520Security%26amp%3Bdata%3D04%257C01%257CSarahzin.Chowdhury%2540microsoft.com%257Cd32eea560a154850520a08d8dcde1fc0%257C72f988bf86f141af91ab2d7cd011db47%257C0%257C0%257C637502193856197905%257CUnknown%257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%253D%257C1000%26amp%3Bsdata%3D1oTkRJs6tjNbmG2mdy%252FqnwkhXk3%252BymKrsDaJvPqXvUo%253D%26amp%3Breserved%3D0%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3E%3CSPAN%20data-contrast%3D%22auto%22%3EAutomate%20alerts%20management%20with%20Microsoft%20Power%20Automate%3C%2FSPAN%3E%3C%2FA%3E%3CSPAN%20data-contrast%3D%22none%22%3E%E2%80%AFand%20Microsoft%20Defender%20for%20Cloud%20Apps%3C%2FSPAN%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%3E%3CP%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3C%2FTBODY%3E%0A%3C%2FTABLE%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22TextRun%20SCXO5756954%20BCX8%22%20data-contrast%3D%22none%22%3E%3CSPAN%20class%3D%22NormalTextRun%20SCXO5756954%20BCX8%22%3ETo%20experience%20the%20benefits%20of%20full-featured%20CASB%2C%20sign%20up%20for%20a%E2%80%AF%26nbsp%3B%3C%2FSPAN%3E%3C%2FSPAN%3E%3CA%20class%3D%22Hyperlink%20SCXO5756954%20BCX8%22%20href%3D%22https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Fwww.microsoft.com%252Fen-us%252Fmicrosoft-365%252Fenterprise-mobility-security%252Fcloud-app-security%26amp%3Bdata%3D04%257C01%257CSarahzin.Chowdhury%2540microsoft.com%257Cd32eea560a154850520a08d8dcde1fc0%257C72f988bf86f141af91ab2d7cd011db47%257C0%257C0%257C637502193856207871%257CUnknown%257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%253D%257C1000%26amp%3Bsdata%3DMvgvihqqztOx%252Bt8pC7DXWSzxqstF946i%252FpeKEnejB74%253D%26amp%3Breserved%3D0%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20nofollow%22%3Efree%20trial%E2%80%94Microsoft%20Defender%20for%20Cloud%20Apps%3C%2FA%3E%3CSPAN%20class%3D%22TextRun%20SCXO5756954%20BCX8%22%20data-contrast%3D%22none%22%3E%3CSPAN%20class%3D%22NormalTextRun%20SCXO5756954%20BCX8%22%3E.%3C%2FSPAN%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22TextRun%20SCXO5756954%20BCX8%22%20data-contrast%3D%22none%22%3E%3CSPAN%20class%3D%22NormalTextRun%20SCXO5756954%20BCX8%22%3E%E2%80%AF%3C%2FSPAN%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22EOP%20SCXO5756954%20BCX8%22%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22EOP%20SCXO5756954%20BCX8%22%3E%3CSPAN%20class%3D%22TextRun%20SCXO214438589%20BCX8%22%20data-contrast%3D%22none%22%3E%3CSPAN%20class%3D%22NormalTextRun%20SCXO214438589%20BCX8%22%3EFollow%20us%20on%20LinkedIn%20as%E2%80%AF%3C%2FSPAN%3E%3C%2FSPAN%3E%3CA%20class%3D%22Hyperlink%20SCXO214438589%20BCX8%22%20href%3D%22https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Fwww.linkedin.com%252Ffeed%252Fupdate%252Furn%253Ali%253Aactivity%253A6757823818808594432%252F%253FupdateEntityUrn%253Durn%25253Ali%25253Afs_feedUpdate%25253A%252528V2%25252Curn%25253Ali%25253Aactivity%25253A6757823818808594432%252529%26amp%3Bdata%3D04%257C01%257CSarahzin.Chowdhury%2540microsoft.com%257Cd32eea560a154850520a08d8dcde1fc0%257C72f988bf86f141af91ab2d7cd011db47%257C0%257C0%257C637502193856217827%257CUnknown%257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%253D%257C1000%26amp%3Bsdata%3DllZzFj2NPmR0VITaONuG7H%252B67sgbm3QEEWN7DXw%252BeTs%253D%26amp%3Breserved%3D0%22%20target%3D%22_blank%22%20rel%3D%22noreferrer%20noopener%20nofollow%22%3E%3CSPAN%20class%3D%22TextRun%20SCXO214438589%20BCX8%22%20data-contrast%3D%22auto%22%3E%3CSPAN%20class%3D%22NormalTextRun%20SCXO214438589%20BCX8%22%3E%23CloudAppSecurity%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FA%3E%3CSPAN%20class%3D%22TextRun%20SCXO214438589%20BCX8%22%20data-contrast%3D%22none%22%3E%3CSPAN%20class%3D%22NormalTextRun%20SCXO214438589%20BCX8%22%3E.%20To%20learn%20more%20about%20Microsoft%20Security%20solutions%2C%20visit%20our%3C%2FSPAN%3E%3C%2FSPAN%3E%3CA%20class%3D%22Hyperlink%20SCXO214438589%20BCX8%22%20href%3D%22https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Fwww.microsoft.com%252Fen-us%252Fsecurity%252Fbusiness%252Fsolutions%26amp%3Bdata%3D04%257C01%257CSarahzin.Chowdhury%2540microsoft.com%257Cd32eea560a154850520a08d8dcde1fc0%257C72f988bf86f141af91ab2d7cd011db47%257C0%257C0%257C637502193856217827%257CUnknown%257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%253D%257C1000%26amp%3Bsdata%3DzoyjJC%252BQVpooD7HvkfTdxSx%252BdAVYsLjC6I7uTjfqAP8%253D%26amp%3Breserved%3D0%22%20target%3D%22_blank%22%20rel%3D%22noreferrer%20noopener%20nofollow%22%3E%3CSPAN%20class%3D%22TextRun%20SCXO214438589%20BCX8%22%20data-contrast%3D%22auto%22%3E%3CSPAN%20class%3D%22NormalTextRun%20SCXO214438589%20BCX8%22%3E%26nbsp%3Bwebsite.%26nbsp%3B%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FA%3E%3CSPAN%20class%3D%22TextRun%20SCXO214438589%20BCX8%22%20data-contrast%3D%22none%22%3E%3CSPAN%20class%3D%22NormalTextRun%20SCXO214438589%20BCX8%22%3EBookmark%20the%26nbsp%3B%3C%2FSPAN%3E%3C%2FSPAN%3E%3CA%20class%3D%22Hyperlink%20SCXO214438589%20BCX8%22%20href%3D%22https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Fwww.microsoft.com%252Fsecurity%252Fblog%252F%26amp%3Bdata%3D04%257C01%257CSarahzin.Chowdhury%2540microsoft.com%257Cd32eea560a154850520a08d8dcde1fc0%257C72f988bf86f141af91ab2d7cd011db47%257C0%257C0%257C637502193856227782%257CUnknown%257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%253D%257C1000%26amp%3Bsdata%3DQyGbxqgVmMLXQw4zofCAywOBg8oJdXoTGLoPew0N6b8%253D%26amp%3Breserved%3D0%22%20target%3D%22_blank%22%20rel%3D%22noreferrer%20noopener%20nofollow%22%3E%3CSPAN%20class%3D%22TextRun%20SCXO214438589%20BCX8%22%20data-contrast%3D%22auto%22%3E%3CSPAN%20class%3D%22NormalTextRun%20SCXO214438589%20BCX8%22%3ESecurity%20blog%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FA%3E%26nbsp%3B%3CSPAN%20class%3D%22TextRun%20SCXO214438589%20BCX8%22%20data-contrast%3D%22none%22%3E%3CSPAN%20class%3D%22NormalTextRun%20SCXO214438589%20BCX8%22%3Eto%20keep%20up%20with%20our%20expert%20coverage%20on%20security%20matters.%20Also%2C%20follow%20us%20at%26nbsp%3B%3C%2FSPAN%3E%3C%2FSPAN%3E%3CA%20class%3D%22Hyperlink%20SCXO214438589%20BCX8%22%20href%3D%22https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Ftwitter.com%252F%2540MSFTSecurity%26amp%3Bdata%3D04%257C01%257CSarahzin.Chowdhury%2540microsoft.com%257Cd32eea560a154850520a08d8dcde1fc0%257C72f988bf86f141af91ab2d7cd011db47%257C0%257C0%257C637502193856227782%257CUnknown%257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%253D%257C1000%26amp%3Bsdata%3DbZz38HU0P7z4qbSrL3dA1L8pHyhxVUJvr4cg8hQq7RQ%253D%26amp%3Breserved%3D0%22%20target%3D%22_blank%22%20rel%3D%22noreferrer%20noopener%20nofollow%22%3E%3CSPAN%20class%3D%22TextRun%20SCXO214438589%20BCX8%22%20data-contrast%3D%22auto%22%3E%3CSPAN%20class%3D%22NormalTextRun%20SCXO214438589%20BCX8%22%3E%40MSFTSecurity%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FA%3E%3CSPAN%20class%3D%22TextRun%20SCXO214438589%20BCX8%22%20data-contrast%3D%22none%22%3E%3CSPAN%20class%3D%22NormalTextRun%20SCXO214438589%20BCX8%22%3E%E2%80%AFon%20Twitter%2C%20and%E2%80%AF%3C%2FSPAN%3E%3C%2FSPAN%3E%3CA%20class%3D%22Hyperlink%20SCXO214438589%20BCX8%22%20href%3D%22https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Fwww.linkedin.com%252Fshowcase%252Fmicrosoft-security%252F%26amp%3Bdata%3D04%257C01%257CSarahzin.Chowdhury%2540microsoft.com%257Cd32eea560a154850520a08d8dcde1fc0%257C72f988bf86f141af91ab2d7cd011db47%257C0%257C0%257C637502193856237739%257CUnknown%257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%253D%257C1000%26amp%3Bsdata%3DUdzMs5GkMJtPUG5E6MnftcrjbDHP0mmKtTxNwvQbCds%253D%26amp%3Breserved%3D0%22%20target%3D%22_blank%22%20rel%3D%22noreferrer%20noopener%20nofollow%22%3E%3CSPAN%20class%3D%22TextRun%20SCXO214438589%20BCX8%22%20data-contrast%3D%22auto%22%3E%3CSPAN%20class%3D%22NormalTextRun%20SCXO214438589%20BCX8%22%3EMicrosoft%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FA%3E%3CSPAN%20class%3D%22EOP%20SCXO214438589%20BCX8%22%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-2751518%22%20slang%3D%22en-US%22%3E%3CP%3E%3CFONT%20size%3D%224%22%20color%3D%22%23800080%22%3E%3CSTRONG%3EWelcome%20to%20the%20Microsoft%20Defender%20for%20Cloud%20Apps%20Ninja%20Training!%3C%2FSTRONG%3E%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CFONT%20size%3D%222%22%3ESeptember%202021%3C%2FFONT%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-2751518%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3ECloud%20Security%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EIdentity%20and%20Access%20Management%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EInformation%20Protection%20and%20Governance%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EMicrosoft%20365%20Defender%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EMicrosoft%20Defender%20for%20Identity%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EMicrosoft%20Information%20Protection%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3ESecurity%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EThreat%20Protection%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Version history
Last update:
‎Nov 02 2021 05:25 PM
Updated by: