Protect Your Infrastructure By Using Microsoft Defender For Cloud Apps

Discover best practices and recommendations for you to protect your infrastructure by using Microsoft defender for cloud apps.

Following the productivity initiative launched before, we continue to support your journey to digital transformation by providing shortcuts and useful tips to help you leverage your Office 365 Apps, and Microsoft licensing, and help you make your daily tasks easier and more productive.

In today’s blog post, you’ll find 2 key recommendations to protect your infrastructure by using Microsoft defender for cloud apps, but first, let’s start by understanding what Microsoft Defender for Cloud Apps is.

Why is Defender for Cloud Apps?

Before named “Cloud App Security”, the Microsoft Defender for Cloud Apps is a Cloud Access Security Broker (CASB) that supports various deployment modes including log collection, API connectors, and reverse proxy. It provides rich visibility, control over data travel, and sophisticated analytics to identify and combat cyberthreats across all your Microsoft and third-party cloud services.

Microsoft Defender for Cloud Apps natively integrates with leading Microsoft solutions and is designed with security professionals in mind. It provides simple deployment, centralized management, and innovative automation capabilities. Click here to read more.

Key Recommendations To Protect Your Infrastructure 

1. Block download attachments

To avoid leaking information by using Microsoft technologies, you can configure Cloud App Security at your organization to monitor the Office 365 applications like SharePoint and Outlook.

Once configured, multiple policies can be created that integrate Azure, defender, and other cloud applications. In the video below, you can see how you could block the download of attachments option from outlook and SharePoint, so that you can protect the most valuable business asset: the information.

Pre-requisites: In order to configure MCAS, make sure that the correct following permissions and licenses are in place:

  • Global Administrator or a Security Administrator
  • Enterprise Mobility + Security E5

2. Control and manage access to networks

Access to information must be protected from as many sides as possible.

Thanks to defender for cloud apps, you can establish control over access to office 365. On way to do it is when access your office portal by using secure and approved browsers from a device, and when trying to access from an insecure network such as TOR networks, access gets identified and protected if using Defender for Cloud apps, so you could identify this kind of networks.

In order to accomplish this, use a combination of Conditional Access and Defender for Cloud Apps features.

Pre-requisites: In order to configure MCAS, make sure that the following permissions and licenses are in place:

  • Global Administrator or a Security Administrator
  • Enterprise Mobility + Security E5

If you’d like to hear more about how to leverage Microsoft Defenfer for Cloud Apps, feel free to reach out to VNEXT specialits for more information. Click here to connect.