Tutorial / Cram Notes
Cloud App Discovery is a feature of Microsoft Cloud App Security (MCAS) that enables organizations to discover which cloud applications are being used in their IT environment. For professionals preparing for the MS-101 Microsoft 365 Mobility and Security exam, understanding how to configure Cloud App Discovery is essential. MCAS provides insights into the shadow IT practices within an organization, helping maintain security and compliance.
Prerequisites
Before configuring Cloud App Discovery, certain prerequisites must be fulfilled:
- An active subscription to Microsoft Cloud App Security.
- Appropriate permissions in the Microsoft 365 Admin Center to access the Cloud App Security portal.
- Network logs from your firewalls and proxies. Supported formats include Check Point, Cisco ASA, Palo Alto Networks, Blue Coat Proxy, and more.
Step by Step Configuration
1. Enable Cloud Discovery
To begin with, you need to navigate to the Cloud App Security portal. Once there, you must turn on Cloud Discovery by setting the appropriate control status.
- Log into the Cloud App Security portal.
- Go to Settings (the gear icon), and then select “Cloud Discovery settings”.
- Toggle the Cloud Discovery to ‘enable’.
2. Upload Traffic Logs
Collect and upload your traffic logs for analysis.
- Under the Cloud Discovery settings, choose the “Data sources” tab.
- Click “Add data source” and give your data source a name.
- Choose the format of your traffic logs.
- Upload your logs either manually or by using automated log uploaders.
3. Define Discovery Policies
Creating custom discovery policies can help organizations focus on specific types of traffic or behaviors:
- Within the Cloud App Security portal, navigate to “Control” and then to “Policies”.
- Click on “Create policy” and select “Cloud Discovery anomaly detection policy”.
- Set up the policy by specifying criteria such as risk levels, number of transactions, and uploading frequency.
- Define the actions that should be taken when the policy is triggered, such as generating an alert.
4. Analyze the Cloud Discovery Dashboard
Once the logs are uploaded, the Cloud Discovery Dashboard will provide comprehensive insights into the use of cloud applications.
- Access the dashboard to view information about recognized apps.
- Assess the risk score assigned to each application based on more than 70 risk factors.
- Identify top users, IP addresses, and transactions to understand how cloud apps are being used.
5. Sanction/Unsanction Apps
Decide which applications to allow or block within the organization.
- In the Cloud App Catalog, find the app you want to sanction or unsanction.
- Click on the app to view more details.
- Use the “Sanction” or “Unsanction” action to control its use.
6. Continuous Reporting and Alerts
Set up alerts and scheduled reports for ongoing monitoring.
- From the “Alerts” menu, configure policies to get real-time notifications for any unusual activities.
- In the “Reports” tab, schedule regular reports to keep stakeholders informed about cloud app usage and compliance.
Example Use-Case
Let’s take an example of a mid-sized company, Acme Corp, that wishes to discover Shadow IT apps for regulation and compliance purposes.
During the configuration phase, the IT team collects web traffic logs from their network devices. After importing these logs into MCAS, they are able to visualize the use of non-authorized cloud services across departments. Upon reviewing the Cloud Discovery Dashboard, Acme Corp’s IT team notices an alarming use of a high-risk cloud storage application that is not compliant with their data protection policy. They immediately sanction the application and create a policy to monitor any future use.
Additionally, they continuously train their workforce to use sanctioned applications and the risks associated with unauthorized services, thus mitigating the risk of data leaks and non-compliance.
Conclusion
Configuring Cloud App Discovery is crucial to obtaining visibility into unsanctioned cloud applications and mitigating potential security risks. By following these steps and leveraging the tools provided by MCAS, organizations can better manage and control their cloud environment. For MS-101 candidates, understanding this configuration process is important to ensure they have the skills to maintain a secure and compliant Microsoft 365 deployment.
Practice Test with Explanation
True or False: Cloud App Security can be used to discover applications only once you have configured log collection.
- True
- False
Answer: True
Explanation: Cloud App Security requires the configuration of log collection to discover and analyze applications being used within the organization.
Multiple Select: What are the methods available for log collection in Cloud App Security?
- Manually upload log files
- Integrated with firewalls and proxies
- API connectors
- Network traffic analysis in real-time
Answer: Manually upload log files, Integrated with firewalls and proxies, API connectors
Explanation: Cloud App Security supports log collection through manual upload, integration with firewalls and proxies, and API connectors. Real-time network traffic analysis is not a primary method for log collection in Cloud App Security.
Single Select: Which feature provides visibility into shadow IT in Microsoft Cloud App Security?
- Conditional Access App Control
- Cloud App Catalog
- Cloud Discovery
- App Governance
Answer: Cloud Discovery
Explanation: Cloud Discovery is the feature in Microsoft Cloud App Security that provides organizations with the ability to detect and report on shadow IT within their environment.
True or False: Cloud App Discovery requires an agent to be installed on each user’s device.
- True
- False
Answer: False
Explanation: Cloud App Discovery does not require an agent on users’ devices. It works by analyzing traffic logs from your firewalls and proxies.
Multiple Select: Which data sources can be used for Cloud Discovery in Microsoft Cloud App Security?
- Emails
- Traffic logs
- VPN logs
- Security alerts
Answer: Traffic logs, VPN logs
Explanation: Traffic logs and VPN logs are among the data sources that can be analyzed by Microsoft Cloud App Security to provide Cloud Discovery insights. Emails and security alerts are not directly used for Cloud Discovery.
Single Select: To use Cloud App Discovery, which of the following is a prerequisite?
- Office 365 subscription
- Azure subscription
- Microsoft 365 E5 subscription
- Windows Server CAL
Answer: Microsoft 365 E5 subscription
Explanation: Cloud App Discovery is a feature within Microsoft Cloud App Security, which requires a Microsoft 365 E5 subscription, or an equivalent license offering this feature.
True or False: Cloud Discovery in Cloud App Security can analyze logs from on-premises environments solely.
- True
- False
Answer: False
Explanation: Cloud Discovery can analyze logs from both on-premises and cloud environments, offering a comprehensive view of software usage.
Multiple Select: What types of information does Cloud App Discovery provide about discovered apps?
- App name
- Risk score
- Number of users
- Server location
Answer: App name, Risk score, Number of users, Server location
Explanation: Cloud App Discovery provides detailed information on discovered apps, including the app name, risk score, number of users, and the location of the servers the app is communicating with.
Single Select: Which of these types of solutions can integrate with Microsoft Cloud App Security for enhanced data input for Cloud Discovery?
- Customer Relationship Management (CRM) systems
- Secure Web Gateways (SWGs)
- Enterprise Resource Planning (ERP) systems
- Human Resource Management Systems (HRMS)
Answer: Secure Web Gateways (SWGs)
Explanation: Microsoft Cloud App Security can integrate with Secure Web Gateways (SWGs) to leverage the traffic data they collect for enhanced Cloud Discovery analytics.
True or False: To create a snapshot report of cloud app use for a specific time period, you would need to configure continuous report delivery in Cloud App Security.
- True
- False
Answer: False
Explanation: Continuous reports are for ongoing monitoring. To create a snapshot report for a specific time period, you can manually upload the relevant logs for that time frame and generate an ad hoc report.
Interview Questions
What is Cloud App Discovery?
Cloud App Discovery is a feature of Microsoft Cloud App Security that allows you to discover and identify the cloud apps and services used by your organization.
What are the benefits of Cloud App Discovery?
Cloud App Discovery enables you to gain visibility into cloud app usage and assess risk, as well as to create policies to enforce security and compliance requirements.
How can you configure Cloud App Discovery?
Cloud App Discovery can be configured using a Docker container that you can download from the Microsoft Cloud App Security portal.
What are the system requirements for running the Cloud App Discovery container?
The Cloud App Discovery container requires Docker version 19.03 or later and a host with at least 2 cores, 8 GB of RAM, and 50 GB of disk space.
What are the steps to configure Cloud App Discovery?
The steps to configure Cloud App Discovery include downloading the Cloud App Discovery Docker container, configuring the container settings, creating a token to connect to the Cloud App Security portal, and running the container.
How can you monitor Cloud App Discovery?
Cloud App Discovery provides a dashboard where you can view usage data and generate reports to help you monitor cloud app usage and assess risk.
What types of cloud apps can Cloud App Discovery detect?
Cloud App Discovery can detect a wide range of cloud apps, including productivity apps, collaboration apps, social media, file sharing, and more.
How can you use Cloud App Discovery to assess risk?
Cloud App Discovery provides a risk assessment score for each cloud app based on factors such as data protection, compliance, and security.
How can you use Cloud App Discovery to enforce security and compliance policies?
Cloud App Discovery allows you to create policies to enforce security and compliance requirements for cloud app usage, such as requiring multi-factor authentication, blocking access from specific IP addresses, or restricting access to certain types of data.
Can Cloud App Discovery be integrated with other security tools?
Yes, Cloud App Discovery can be integrated with other security tools through APIs and connectors to provide a comprehensive security solution.
This blog post on configuring Cloud App Discovery is really helpful. Thanks!
Can someone explain how to enable automatic log collection for Cloud App Discovery?
Great article but it would have been better if you included more screenshots.
How do you configure Cloud App Discovery to work with a proxy server?
How frequently should data be uploaded to Cloud App Discovery?
Is there a way to filter out personal cloud apps from Cloud App Discovery?
The steps are clear and concise. Thumbs up!
I am having trouble with the API token generation process. Any tips?