Cloud Discovery
108 TopicsEMS E3 CAS Discovery Functionality
When I look at the O365 EM+S E3 license setting in the O365 Admin Center, it shows Cloud App Security Discovery as an option. This page https://support.office.com/en-us/article/get-ready-for-office-365-cloud-app-security-d9ee4d67-f2b3-42b4-9c9e-c4529904990a?ui=en-US&rs=en-US&ad=US clearly states that we need E5 to get CAS, but does not mention Cloud App Security Discovery. Can someone please provide me the definitive answer about what is actually possible with EMS E3 regarding CAS.Configure Palo Alto Panorama for Cloud App Discovery
Below are the steps I've taken to integrate PaloAlto Panorama Traffic logs to Cloud App Discovery. In this setup, multiple PA Firewalls are configured forward their logs to Panorama. Check the Palo Alto guides for how this is setup. Your thoughts and feedback is much appreciated. Follow the Microsoft guide to https://docs.microsoft.com/en-us/cloud-app-security/discovery-docker-ubuntu-azure. I've settled with the Docker for Ubuntu on Azure after multiple failed attempts with RHEL 8.1. For Step 3 - On-premises configuration of your network appliances log into Panorama, make sure Context Panorama on the top left is selected. Select the Panorama tab and Server Profiles -> Syslog on the left hand menu. Select Add to create a new Syslog Server Profile Enter a Name for the Profile - i.e. MCAS Log Collector Select Add in the Servers tab and provide the details for the collector server, i.e.:Name: MCAS Server Azure IP: <<Log Collector IP>> Transport: as per your collector config, i.e. TCP Port: as per your collector config, i.e. 601 Format: BSS Facility: LOG_USER Select Ok to save the Syslog Server and Profile. Go to Collector Groups and select the "default" Collector Group. Select the Collector Log Forwarding tab, then the Traffic tab. Select Add and give the Log Setting a name, i.e. MCAS Logs Set filter to All Logs Select Add in the Syslog field and select the MCAS Log Collector. Select Ok, and Ok again, then save and commit your changes. Done. Follow on with Step 4 - Verify the successful deployment in the Cloud App Security portal in the Microsoft guide.MDATP Integration - Unsanctioned Apps - Allow for some users?
Hi, I've reviewed the documentation @ https://docs.microsoft.com/en-us/cloud-app-security/governance-discovery in relation to blocking unsanctioned apps - specifically using MDATP on Win10 endpoints. The documentation doesn't mention anything about governance when using MDATP - Is the functionality similar to the integration with Zscaler and iBoss, where once an app is tagged as unsanctioned it is blocked on the endpoint for all users? Is there any way to provide greater granularity to the process - ie allow an app for some users and not for others or is it a binary choice for the entire organisation? Thanks Paul14KViews1like25CommentsCloud App Security vs Discovery
I am pretty confused on the difference between these two products. I'm currently using Cloud App Security with a client ($5/usr) and I access the console from O365 > Admin Centers > Cloud App Security. In the new Azure portal though, there's an Azure AD Cloud App Discovery blade that says I need an Azure AD P1 license to access it, so clearly my Cloud App Security license isn't supposed to be used to access this. Are these the same app? Are they changing the licensing requirements? Docs for Cloud App Discovery: https://msdn.microsoft.com/en-us/library/azure/mt143581.aspx Docs for Cloud App Security: https://docs.microsoft.com/en-us/cloud-app-security/ Blog post making them look like the same thing: https://blogs.technet.microsoft.com/enterprisemobility/2017/09/27/whats-new-in-microsoft-cloud-app-security-ignite-2017/ Note: The client in question is on Microsoft 365 Business + Cloud App Security + Exchange Online Advanced Threat Protection.SolvedExclude Users or Devices
Hello Community Members, we have some unsanctioned apps in MCAS and created a service user which still should have access to those domains. Is it possible to excluse users or devices so that they wont be blocked when accessing the domains? Thanks in advance 🙂7KViews0likes14CommentsCheckpoint firewall - automatic log collection - recommended method ?
Hi - is there a recommended/supported method to achieve automatic Checkpoint firewall log collection ? On the Checkpoint side it seems there are 2 main log export mechanisms. 1. CPLOGTOSYSLOG tool. 2. Log Exporter - Check Point Log Export tool. I am getting the impression that cplogtosyslog is the preferred supported method from Microsoft side. However from Checkpoint side Log Exporter tool is their preferred method going forward. Any guidance or advice on how to get this to work would be appreciated ? Thanks...5.1KViews0likes5CommentsTwo CAS's? -- confused about discovery through agents on windows clients vs firewall log
There seems to be two Cloud Access Discovery products that have two different "discovery" methods. One seems to be released in late 2015 and seems to get data collection by deploying agents to windows clients. A newer discovery tool seems to collect data by processing Proxy/Firewall logs. Are they really two different products? I would like to have cloud app discovery using agents for roaming clients and locations that don't have a firewall/proxy that works with the log parsing. Of course firewall log parsing has Zero impact on client performance vs. agent based which would have some impact CPU/Disk/Memory and network on the clients as well as agent management (deploy/update/remove). So being able to use both would be preferable. The current docs are confusing: Example - this MSDN link https://msdn.microsoft.com/en-us/library/azure/mt143581.aspx links to this docs.microsoft.com article which seems to imply that agent based discovery is current (https://docs.microsoft.com/en-us/azure/active-directory/active-directory-cloudappdiscovery-whatis) But this same section of documents provides no information on how to perform setup - instead linking to a portal despite the description of: "Check out the improvements to Cloud App Discovery in Azure Active Directory (Azure AD), which are enhanced by https://portal.cloudappsecurity.com/." Clicking on that "check out" link takes you to a portal page for the service - not a description or information page. So now you land on *.portal.cloudappsecurity.com and there is nothing there for agent based data collection. So for grins I go to portal.azure.com and go to Marketplace -> "Security + Identity" and add "Azure AD Cloud app discovery" After 2 hours of provisioning where the pinned tile just indicates its still loading I manually navigate to the Azure Cloud App discovery blade where the unhelpful message: "Discover your cloud apps using the new and enhanced Cloud App Discovery before March 5th, 2018 to avoid disruption of service." floats at the top. This blade has, once I click "quickstart", information on downloading agents and agent based data collection -- but has that worrisome message at the top. If I click on that message it takes me to "https://www.microsoft.com/en-us/" ... so a bad/not helpful link. Now I am left to wonder if the message "Discover your cloud apps using the new and enhanced Cloud App Discovery before March 5th, 2018 to avoid disruption of service" mean that the agent based Cloud app discovery is being phased out 3/5/2018? Is that why the quickstart doesn't display by default? Clicking on the 3/5/2018 message should take me where? Q1: What is the status of Azure AD Cloud app discovery using Windows agents? Q2: What is the status of Azure AD Cloud app discovery using firewall log analysis? Q3: Which of these products is licensed with Microsoft 365 Enterprise E5? Q4: Can I use agent-based discovery and filewall log parsing based discovery at the same time? Q5: If there is a transition/phase out of the agent only data collection system - will agent based discovery be available in the new system - or some other way for roaming users to have their cloud apps "discovered" Q6: Is there someone who owns the doc's for this product - if so would you like more detailed feedback? Thanks! -NSolvedMCAS - Log Collector - Configuration Not Sending to MCAS
I'm fairly new to MCAS. Am attempting to get an onPrem log collector (docker) to transmit ASA logs to the log collector in MCAS. However, something is not working. This docker instance is running within a hyper-v 2016 guest (Guest: Windows Server 2019). The source is an ASA 5508 sending syslog (level 6) to the docker instance on TCP 20000. Host firewall inbound rule allows TCP 20000 from the ASA. Within Azure MCAS, it shows the log collector is "Connected" - Warning: No data was received since log collection deployment. Make sure you complete on-premises configuration of your network appliances. From a review of a NetMon network trace, run from the host, we are receiving traffic from the ASA on TCP 20000. Netstat does show the server is listening on TCP 20000. Below is docker run command. Have opened a case with MS, but they claim to be new as MCAS and docker. Any ideas why I'm not getting data? docker run --name ASALogCollector -p 20000:20000/tcp -p 21:21 -p 20001-20099:20001-20099 -e "PUBLICIP='internalhost.acme.com'" -e "PROXY=" -e "SYSLOG=true" -e "CONSOLE=xxxxx.us3.portal.cloudappsecurity.com" -e "COLLECTOR=ASALogCollector" --security-opt apparmor:unconfined --cap-add=SYS_ADMIN --restart unless-stopped -a stdin -i microsoft/caslogcollector starter4.5KViews0likes5CommentsNew Preview Features - Tag app as "monitored"
I watched the excellent session from Alex Esibov at Ignite 2019 called - "THR2058 - Discover and control Shadow IT across your organization" https://myignite.techcommunity.microsoft.com/sessions/79741?source=sessions Where can I find documentation in relation to the new features of Monitoring apps etc - I can see no mention of them in the existing documentation or release notes reflecting that these features are now actually in preview? Is it private or public preview these features are in, and if it's public preview, when are they due to go live for preview users? Thanks PaulSolved4.4KViews0likes2Comments