Step 7. Discover shadow IT and take control of your cloud apps: Top 10 actions to secure your enviro

Published 03-28-2019 03:57 PM 14K Views
Microsoft

Cloud-based services have significantly increased productivity for today’s workforce, prompting users to adopt new cloud apps and services and making it a challenge for you to keep up. Microsoft Cloud App Security (MCAS), a cloud access security broker (CASB), helps you gain control over shadow IT with tools that give you visibility into the cloud apps and services used in your organization, asses them for risk, and provide sophisticated analytics. You can then make an informed decision about whether you want to sanction the apps you discover or block them from being accessed.

 

Step 7 photo.JPG

 

Read the full blog here.

4 Comments
Super Contributor

Why are you starting with steps 6 and 7? Confusing.

Microsoft

Steps 1-5 were already posted via the EMS Team account...

 

Sorry for any confusion.

Super Contributor

Thanks. But i don't see first 5 parts in this blog. So maybe instead of posting 6 and 7 you could do one post with links to all the parts. Because now all the sudden i see in this blog part 6 and 7 and thinking where the other parts went.

%3CLINGO-SUB%20id%3D%22lingo-sub-390473%22%20slang%3D%22en-US%22%3EStep%207.%20Discover%20shadow%20IT%20and%20take%20control%20of%20your%20cloud%20apps%3A%20Top%2010%20actions%20to%20secure%20your%20enviro%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-390473%22%20slang%3D%22en-US%22%3E%3CP%3ECloud-based%20services%20have%20significantly%20increased%20productivity%20for%20today%E2%80%99s%20workforce%2C%20prompting%20users%20to%20adopt%20new%20cloud%20apps%20and%20services%20and%20making%20it%20a%20challenge%20for%20you%20to%20keep%20up.%20%3CA%20href%3D%22http%3A%2F%2Fwww.aka.ms%2Fmcas%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EMicrosoft%20Cloud%20App%20Security%3C%2FA%3E%20(MCAS)%2C%20a%20cloud%20access%20security%20broker%20(CASB)%2C%20helps%20you%20gain%20control%20over%20shadow%20IT%20with%20tools%20that%20give%20you%20visibility%20into%20the%20cloud%20apps%20and%20services%20used%20in%20your%20organization%2C%20asses%20them%20for%20risk%2C%20and%20provide%20sophisticated%20analytics.%20You%20can%20then%20make%20an%20informed%20decision%20about%20whether%20you%20want%20to%20sanction%20the%20apps%20you%20discover%20or%20block%20them%20from%20being%20accessed.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20style%3D%22width%3A%20781px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F100468i09C3E861E956673B%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20alt%3D%22Step%207%20photo.JPG%22%20title%3D%22Step%207%20photo.JPG%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20style%3D%22display%3A%20inline%20!important%3B%20float%3A%20none%3B%20background-color%3A%20%23ffffff%3B%20color%3A%20%23333333%3B%20cursor%3A%20text%3B%20font-family%3A%20inherit%3B%20font-size%3A%2016px%3B%20font-style%3A%20normal%3B%20font-variant%3A%20normal%3B%20font-weight%3A%20300%3B%20letter-spacing%3A%20normal%3B%20line-height%3A%201.7142%3B%20orphans%3A%202%3B%20text-align%3A%20left%3B%20text-decoration%3A%20none%3B%20text-indent%3A%200px%3B%20text-transform%3A%20none%3B%20-webkit-text-stroke-width%3A%200px%3B%20white-space%3A%20normal%3B%20word-spacing%3A%200px%3B%22%3ERead%20the%20full%20blog%20%3C%2FSPAN%3E%3CA%20style%3D%22background-color%3A%20transparent%3B%20box-sizing%3A%20border-box%3B%20color%3A%20%23146cac%3B%20font-family%3A%20%26amp%3Bquot%3B%20segoeui%26amp%3Bquot%3B%2C%26amp%3Bquot%3Blato%26amp%3Bquot%3B%2C%26amp%3Bquot%3Bhelvetica%20neue%26amp%3Bquot%3B%2Chelvetica%2Carial%2Csans-serif%3B%20font-size%3A%2016px%3B%20font-style%3A%20normal%3B%20font-variant%3A%20normal%3B%20font-weight%3A%20300%3B%20letter-spacing%3A%20normal%3B%20orphans%3A%202%3B%20text-align%3A%20left%3B%20text-decoration%3A%20underline%3B%20text-indent%3A%200px%3B%20text-transform%3A%20none%3B%20-webkit-text-stroke-width%3A%200px%3B%20white-space%3A%20normal%3B%20word-spacing%3A%200px%3B%22%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2019%2F03%2F26%2Fstep-7-discover-shadow-it-and-take-control-of-your-cloud-apps-top-10-actions-to-secure-your-environment%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ehere%3C%2FA%3E%3CSPAN%20style%3D%22display%3A%20inline%20!important%3B%20float%3A%20none%3B%20background-color%3A%20%23ffffff%3B%20color%3A%20%23333333%3B%20cursor%3A%20text%3B%20font-family%3A%20inherit%3B%20font-size%3A%2016px%3B%20font-style%3A%20normal%3B%20font-variant%3A%20normal%3B%20font-weight%3A%20300%3B%20letter-spacing%3A%20normal%3B%20line-height%3A%201.7142%3B%20orphans%3A%202%3B%20text-align%3A%20left%3B%20text-decoration%3A%20none%3B%20text-indent%3A%200px%3B%20text-transform%3A%20none%3B%20-webkit-text-stroke-width%3A%200px%3B%20white-space%3A%20normal%3B%20word-spacing%3A%200px%3B%22%3E.%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-390473%22%20slang%3D%22en-US%22%3E%3CP%3EThis%20series%20outlines%20the%20most%20fundamental%20steps%20you%20can%20take%20with%20your%20investment%20in%20Microsoft%20365%20security%20solutions.%20In%20%E2%80%9CStep%207.%20Discover%20shadow%20IT%20and%20take%20control%20of%20cloud%20apps%2C%E2%80%9D%20you%E2%80%99ll%20learn%20how%20to%20set%20up%20Microsoft%20Cloud%20App%20Security%20(MCAS)%20to%20identify%2C%20access%2C%20and%20manage%20the%20cloud%20applications%20used%20by%20your%20organization.%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-390473%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EMicrosoft%20Cloud%20App%20Security%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-390954%22%20slang%3D%22en-US%22%3ERe%3A%20Step%207.%20Discover%20shadow%20IT%20and%20take%20control%20of%20your%20cloud%20apps%3A%20Top%2010%20actions%20to%20secure%20your%20en%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-390954%22%20slang%3D%22en-US%22%3E%3CP%3EThanks.%20But%20i%20don't%20see%20first%205%20parts%20in%20this%20blog.%20So%20maybe%20instead%20of%20posting%206%20and%207%20you%20could%20do%20one%20post%20with%20links%20to%20all%20the%20parts.%20Because%20now%20all%20the%20sudden%20i%20see%20in%20this%20blog%20part%206%20and%207%20and%20thinking%20where%20the%20other%20parts%20went.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-390948%22%20slang%3D%22en-US%22%3ERe%3A%20Step%207.%20Discover%20shadow%20IT%20and%20take%20control%20of%20your%20cloud%20apps%3A%20Top%2010%20actions%20to%20secure%20your%20en%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-390948%22%20slang%3D%22en-US%22%3E%3CP%3EOleg%20-%20here%20are%20the%20links%20for%20the%20first%205%20blogs%20in%20this%20series%2C%20for%20your%20reference...%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CFONT%20style%3D%22background-color%3A%20%23ffffff%3B%22%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2018%2F12%2F05%2Fstep-1-identify-users-top-10-actions-to-secure-your-environment%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ehttps%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2018%2F12%2F05%2Fstep-1-identify-users-top-10-actions-to-secure-your-environment%2F%3C%2FA%3E%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3E%3CFONT%20style%3D%22background-color%3A%20%23ffffff%3B%22%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2018%2F12%2F17%2Fstep-2-manage-authentication-and-safeguard-access-top-10-actions-to-secure-your-environment%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ehttps%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2018%2F12%2F17%2Fstep-2-manage-authentication-and-safeguard-access-top-10-actions-to-secure-your-environment%2F%3C%2FA%3E%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3E%3CFONT%20style%3D%22background-color%3A%20%23ffffff%3B%22%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2019%2F01%2F16%2Fstep-3-protect-your-identities-top-10-actions-to-secure-your-environment%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ehttps%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2019%2F01%2F16%2Fstep-3-protect-your-identities-top-10-actions-to-secure-your-environment%2F%3C%2FA%3E%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3E%3CFONT%20style%3D%22background-color%3A%20%23ffffff%3B%22%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2019%2F01%2F30%2Fstep-4-set-conditional-access-policies-top-10-actions-to-secure-your-environment%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ehttps%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2019%2F01%2F30%2Fstep-4-set-conditional-access-policies-top-10-actions-to-secure-your-environment%2F%3C%2FA%3E%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3E%3CFONT%20style%3D%22background-color%3A%20%23ffffff%3B%22%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2019%2F02%2F14%2Fstep-5-set-up-mobile-device-management-top-10-actions-to-secure-your-environment%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ehttps%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2019%2F02%2F14%2Fstep-5-set-up-mobile-device-management-top-10-actions-to-secure-your-environment%2F%3C%2FA%3E%3C%2FFONT%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-390907%22%20slang%3D%22en-US%22%3ERe%3A%20Step%207.%20Discover%20shadow%20IT%20and%20take%20control%20of%20your%20cloud%20apps%3A%20Top%2010%20actions%20to%20secure%20your%20en%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-390907%22%20slang%3D%22en-US%22%3E%3CP%3ESteps%201-5%20were%20already%20posted%20via%20the%20EMS%20Team%20account...%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ESorry%20for%20any%20confusion.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-390606%22%20slang%3D%22en-US%22%3ERe%3A%20Step%207.%20Discover%20shadow%20IT%20and%20take%20control%20of%20your%20cloud%20apps%3A%20Top%2010%20actions%20to%20secure%20your%20en%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-390606%22%20slang%3D%22en-US%22%3E%3CP%3EWhy%20are%20you%20starting%20with%20steps%206%20and%207%3F%20Confusing.%3C%2FP%3E%3C%2FLINGO-BODY%3E
Version history
Last update:
‎May 11 2021 01:57 PM
Updated by: