Service Health Dashboard availabilityThe enhanced Cloud App Security Service Health Dashboard is now available within the Microsoft 365 Admin portal for users with Monitor service health permissions. Learn more about Microsoft 365 Admin roles. In the dashboard, you can configure notifications, allowing relevant users to stay updated with the current Cloud App Security status. To learn how to configure email …
Exclusion of Azure Active Directory groups entities from discoveryMicrosoft has added the ability to exclude discovered entities based on imported Azure Active Directory groups. Excluding AAD groups will hide all discovery-related data for any users in these groups. For more information, see Exclude entities. API connector support for ServiceNow Orlando and Paris versionsMicrosoft has added support …
Status page deprecation noticeOn April 29, Cloud App Security will deprecate the service health status page, replacing it with the Service Health Dashboard within the Microsoft 365 Admin portal. The change aligns Cloud App Security with other Microsoft services and provides an enhanced service overview. Only users with Monitor service health permissions can access the dashboard. For more information, …
Enhanced Shadow IT discovery with Microsoft Defender for EndpointMicrosoft has further improved the Defender for Endpoint integration by leveraging enhanced signals for the Defender agent, providing more accurate app discovery and organizational user context. To benefit from the latest enhancements, make sure your organizational endpoints are updated with the latest Windows 10 updates: KB4601383: Windows …
Updates to Policies pageMicrosoft has updated the Policies page, adding a tab for every policy category. Microsoft also added an All policies tab to give you a complete list of all your policies. For more information about the policy categorization, see Policy types. Enhanced Office 365 OAuth apps exportMicrosoft has enhanced the Office 365 OAuth …
New anomaly detection: Suspicious addition of credentials to an OAuth appMicrosoft has extended their anomaly detections to include suspicious addition of privileged credentials to an OAuth app. The new detection is now available out-of-the-box and automatically enabled. The detection can indicate that an attacker has compromised the app and is using it for malicious activity. …
New Shadow IT integration with Menlo SecurityMicrosoft has added native integration with Menlo Security providing you with Shadow IT visibility into app use and control over app access. New Cloud Discovery WatchGuard log parserCloud App Security Cloud Discovery analyzes a wide range of traffic logs to rank and score apps. Now Cloud Discovery includes a …
New enhanced alert monitoring and management experienceAs part of the Microsoft’s ongoing improvements to monitoring and managing alerts, the Cloud App Security Alerts page has been improved based on customer feedback. In the enhanced experience, the Resolved and Dismissed statuses are replaced by the Closed status with a resolution type. New global severity setting for …
Access and session controls for Azure portal GA Conditional Access App Control for the Azure portal is now generally available. For information about configuring these controls, see the Deployment guide.
New Cloud Discovery Menlo Security log parserCloud App Security Cloud Discovery analyzes a wide range of traffic logs to rank and score apps. Now Cloud Discovery includes a built-in log parser to support the Menlo Security CEF format. For a list of supported log parsers, see Supported firewalls and proxies. Azure Active Directory (AD) Cloud …
New anomaly detection: Suspicious OAuth app file download activitiesMicrosoft has extended their anomaly detections to include suspicious download activities by an OAuth app. The new detection is now available out-of-the-box and automatically enabled to alert you when an OAuth app downloads multiple files from Microsoft SharePoint or Microsoft OneDrive in a manner that is unusual …
Two new identity security posture assessments now available for Azure ATP customers: Riskiest lateral movement paths: Unsecure account attributes: specific attributes that cause unwanted security risk for your accounts. Lateral movement paths Remediation Remove the entity from the group as specified in the recommendation. Remove the local administrator permissions for the entity from the device …
New capability of Azure ATP integrated with Microsoft Cloud App Security to detect devices not protected by Local Administrator Password Solution (LAPS). LAPS is a great tool against cyber-attacks and helps you change automatically local administrator password on domain joined machines and saves the password to Active Directory computer account. It will generate a report …
New security configurations for Google Cloud Platform (gradual rollout)Microsoft has expanded our multi-cloud security configurations to provide security recommendations for Google Cloud Platform, based on the GCP CIS benchmark. With this new capability, Cloud App Security provides organizations with a single view for monitoring the compliance status across all cloud platforms, including Azure subscriptions, AWS …
The purpose of this cheat sheet is to cover commonly used threat hunting queries that can be used with Microsoft Threat Protection. Microsoft Threat Protection has a threat hunting capability that is called Advance Hunting (AH). AH is based on Azure Kusto Query Language (KQL). The cheat sheet consist of some of the most frequently …
What’s new in MCAS ? New real-time malware detection (Preview, gradual rollout)Microsoft has expanded their session controls to detect potential malware using Microsoft Threat Intelligence upon file uploads or downloads. The new detection is now available out-of-the-box and can be configured to automatically block files identified as potential malware. For more information, see Block malware …
Effective June 1, 2020, as soon as you have one Microsoft security products among Microsoft Defender ATP, Office 365 ATP, Microsoft Cloud App Security or Azure ATP you will be able to access the new unified console Microsoft Threat Protection with correlation cross-workload, advanced hunting and automatic healing. https://azure.microsoft.com/en-us/updates/mtp-auto-enabled/
This new feature leverages Microsoft Defender ATP network protection in block mode ensuring the protections are in place wherever the device’s location. Prerequisites Microsoft Cloud App Security license Microsoft Defender ATP license Windows 10 version 1709 (OS Build 16299.1085 with KB4493441), Windows 10 version 1803 (OS Build 17134.704 with KB4493464), Windows 10 version 1809 (OS …