Security News > 2020 > February > Cloud computing security: These two Microsoft tools can help you battle shadow IT
Finding what cloud services employees are using is half the battle-integrating Microsoft Cloud App Security and Defender Advanced Threat Protection lets you track, block, or audit cloud app usage.
Microsoft Cloud App Security now includes a shadow IT discovery tool that integrates with Defender ATP to discover cloud app and service usage on any managed device.
Niv Goldenberg, principal group PM manager for cloud security, compares it to a flight recorder: the data is stored for six months in your cloud tenant, so you can go back and audit which files were accessed and what happened to the data if you need to do an investigation, which is an additional layer of protection even for approved cloud applications.
"We see new URLs and new IPs and we can tell if this is a new application, a new signature for an existing application or something that's not actually a cloud application," says Goldenberg.
Dashboards show which applications are used and how widely, and what percentage of usage is approved applications versus shadow IT. You'll also get an alert if vulnerabilities are found in cloud apps that your employees are using.
News URL
Related news
- Microsoft Fixes AI, Cloud, and ERP Security Flaws; One Exploited in Active Attacks (source)
- Best CSPM Tools 2024: Top Cloud Security Solutions Compared (source)
- Best AI Security Tools: Top Solutions, Features & Comparisons (source)
- Microsoft Entra "security defaults" to make MFA setup mandatory (source)
- How AI Is Changing the Cloud Security and Risk Equation (source)
- IcePeony and Transparent Tribe Target Indian Entities with Cloud-Based Tools (source)
- Strategies for CISOs navigating hybrid and multi-cloud security (source)
- Microsoft blames Windows Server 2025 automatic upgrades on 3rd-party tools (source)
- Microsoft pulls Exchange security updates over mail delivery issues (source)
- ScubaGear: Open-source tool to assess Microsoft 365 configurations for security gaps (source)