Get started with Microsoft Defender for Cloud Apps
This quickstart describes how to start working with Microsoft Defender for Cloud Apps on the Microsoft Defender Portal.
Defender for Cloud Apps can help you use the benefits of cloud applications while maintaining control of your corporate resources. Defender for Cloud Apps improves your visibility into cloud activity and helps increase protection over your corporate data.
Tip
As a companion to this article, we recommend using the Microsoft Defender for Cloud Apps automated setup guide when signed in to the Microsoft 365 admin center. This guide will customize your experience based on your environment. To review best practices without signing in and activating automated setup features, go to the Microsoft 365 setup portal.
Prerequisites
To set up Defender for Cloud Apps, you must be a Global Administrator or a Security Administrator in Microsoft Entra ID or Microsoft 365.
Users with admin roles have the same admin permissions across any cloud apps your organization is subscribed to, regardless of where you've assigned the role. For more information, see Assign admin roles and Assigning administrator roles in Microsoft Entra ID.
Microsoft Defender for Cloud Apps is a security tool and therefore doesn't require Microsoft 365 productivity suite licenses. For Microsoft 365 Cloud App Security (Microsoft Defender for Cloud Apps only for Microsoft 365), see What are the differences between Microsoft Defender for Cloud Apps and Microsoft 365 Cloud App Security?.
Access Defender for Cloud Apps
Obtain a Defender for Cloud Apps license for each user you want protected by Defender for Cloud Apps. For more information, see the Microsoft 365 licensing datasheet.
A Defender for Cloud Apps trial is available as part of a Microsoft 365 E5 trial, and you can purchase licenses from the Microsoft 365 admin center > Marketplace. For more information, see Try or buy Microsoft 365 or Get support for Microsoft 365 for business.
Note
Microsoft Defender for Cloud Apps is a security tool and therefore doesn't require Microsoft 365 productivity suite licenses. For more information, see What are the differences between Microsoft Defender for Cloud Apps and Microsoft 365 Cloud App Security?.
Access Defender for Cloud Apps on the Microsoft Defender Portal under Cloud Apps. For example:
Step 1: Set instant visibility, protection, and governance actions for your apps
How to page: Set instant visibility, protection, and governance actions for your apps
Required task: Connect apps
- In the Microsoft Defender Portal, select Settings. Then choose Cloud Apps.
- Under Connected Apps, select App Connectors.
- Select the +Connect an app to add an app and then select an app.
- Follow the configuration steps to connect the app.
Why connect an app? After you connect an app, you can gain deeper visibility so you can investigate activities, files, and accounts for the apps in your cloud environment.
Step 2: Protect sensitive information with DLP policies
How to page: Protect sensitive information with DLP policies
Recommended task: Enable file monitoring and create file policies
- In the Microsoft Defender Portal, select Settings. Then choose Cloud Apps.
- Under Information Protection, select Files.
- Select Enable file monitoring and then select Save.
- If you use sensitivity labels from Microsoft Purview Information Protection, under Information Protection, select Microsoft Information Protection.
- Select the required settings and then select Save.
- In Step 3, create File policies to meet your organizational requirements.
Tip
You can view files from your connected apps by browsing to Cloud Apps > Files in the Microsoft Defender Portal.
Migration recommendation
We recommend using Defender for Cloud Apps sensitive information protection in parallel with your current Cloud Access Security Broker (CASB) solution. Start by connecting the apps you want to protect to Microsoft Defender for Cloud Apps. Since API connectors use out-of-band connectivity, no conflict will occur. Then progressively migrate your policies from your current CASB solution to Defender for Cloud Apps.
Note
For third-party apps, verify that the current load does not exceed the app's maximum number of allowed API calls.
Step 3: Control cloud apps with policies
How to page: Control cloud apps with policies
Required task: Create policies
To create policies
- In the Microsoft Defender Portal, under Cloud Apps, choose Policies -> Policy templates.
- Choose a policy template from the list, and then select the + icon to create the policy.
- Customize the policy (select filters, actions, and other settings), and then choose Create.
- Under Cloud Apps, choose Policies -> Policy management, to choose the policy and see the relevant matches (activities, files, alerts).
Tip
To cover all your cloud environment security scenarios, create a policy for each risk category.
How can policies help your organization?
You can use policies to help you monitor trends, see security threats, and generate customized reports and alerts. With policies, you can create governance actions, and set data loss prevention and file-sharing controls.
Step 4: Set up Cloud Discovery
How to page: Set up Cloud Discovery
Required task: Enable Defender for Cloud Apps to view your cloud app use
Integrate with Microsoft Defender for Endpoint to automatically enable Defender for Cloud Apps to monitor your Windows 10 and Windows 11 devices inside and outside your corporation.
If you use Zscaler, integrate it with Defender for Cloud Apps.
To achieve full coverage, create a continuous Cloud Discovery report
- In the Microsoft Defender Portal, select Settings. Then choose Cloud Apps.
- Under Cloud Discovery, choose Automatic log upload.
- On the Data sources tab, add your sources.
- On the Log collectors tab, configure the log collector.
Migration recommendation
We recommend using Defender for Cloud Apps discovery in parallel with your current CASB solution. Start by configuring automatic firewall log upload to Defender for Cloud Apps log collectors. If you use Defender for Endpoint, in Microsoft Defender XDR, make sure you turn on the option to forward signals to Defender for Cloud Apps. Configuring Cloud Discovery won't conflict with the log collection of your current CASB solution.
To create a snapshot Cloud Discovery report
- In the Microsoft Defender Portal, under Cloud Apps, choose Cloud discovery.
- In the top right-hand corner, select Actions -> Create Cloud Discovery snapshot report.
Why should you configure Cloud Discovery reports?
Having visibility into shadow IT in your organization is critical. After your logs are analyzed, you can easily find which cloud apps are being used, by which people, and on which devices.
Step 5: Personalize your experience
How to page: Personalize your experience
Recommended task: Add your organization details
To enter email settings
- In the Microsoft Defender Portal, select Settings. Then choose Cloud Apps.
- Under System, select Mail settings.
- Under Email sender identity, enter your email addresses and display name.
- Under Email design, upload your organization's email template.
To set admin notifications
- In the Microsoft Defender Portal, select Settings. Then choose Microsoft Defender XDR.
- Select Email notifications.
- Configure the methods you want to set for system notifications.
To customize the score metrics
- In the Microsoft Defender Portal, select Settings. Then choose Cloud Apps.
- Under Cloud Discovery, choose Score metrics.
- Configure the importance of various risk values.
- Choose Save.
Now the risk scores given to discovered apps are configured precisely according to your organization needs and priorities.
Why personalize your environment?
Some features work best when they're customized to your needs. Provide a better experience for your users with your own email templates. Decide what notifications you receive and customize your risk score metric to fit your organization's preferences.
Step 7: Organize the data according to your needs
How to page: Working with IP ranges and tags
Recommended task: Configure important settings
To create IP address tags
In the Microsoft Defender Portal, select Settings. Then choose Cloud Apps.
Under System, select IP address ranges.
Select + Add IP address range to add an IP address range.
Enter the IP range Name, IP address ranges, Category, and Tags.
Choose Create.
Now you can use IP tags when you create policies, and when you filter and create continuous reports.
To create continuous reports
- In the Microsoft Defender Portal, select Settings. Then choose Cloud Apps.
- Under Cloud Discovery, choose Continuous reports.
- Choose Create report.
- Follow the configuration steps.
- Choose Create.
Now you can view discovered data based on your own preferences, such as business units or IP ranges.
To add domains
- In the Microsoft Defender Portal, select Settings. Then choose Cloud Apps.
- Under System, choose Organization details.
- Add your organization's internal domains.
- Choose Save.
Why should you configure these settings?
These settings help give you better control of features in the console. With IP tags, it's easier to create policies that fit your needs, to accurately filter data, and more. Use Data views to group your data into logical categories.
Next steps
If you run into any problems, we're here to help. To get assistance or support for your product issue, please open a support ticket..
Feedback
https://aka.ms/ContentUserFeedback.
Coming soon: Throughout 2024 we will be phasing out GitHub Issues as the feedback mechanism for content and replacing it with a new feedback system. For more information see:Submit and view feedback for