Events
Power BI DataViz World Championships
14 Feb, 4 pm - 31 Mar, 4 pm
With 4 chances to enter, you could win a conference package and make it to the LIVE Grand Finale in Las Vegas
Learn moreThis browser is no longer supported.
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.
Note
This article forms part of the Power BI implementation planning series of articles. This series focuses primarily on the Power BI experience within Microsoft Fabric. For an introduction to the series, see Power BI implementation planning.
This article describes the planning activities related to implementing Defender for Cloud Apps as it relates to monitoring Power BI. It's targeted at:
Important
Monitoring and data loss prevention (DLP) is a significant organization-wide undertaking. Its scope and impact are far greater than Power BI alone. These types of initiative require funding, prioritization, and planning. Expect to involve several cross-functional teams in planning, usage, and oversight efforts.
We recommend that you follow a gradual, phased approach to rolling out Defender for Cloud Apps for monitoring Power BI. For a description of the types of rollout phases that you should consider, see Information protection for Power BI (Rollout phases).
Microsoft Defender for Cloud Apps (formerly known as Microsoft Cloud App Security) is a Cloud Access Security Broker (CASB) that supports various deployment modes. It has a broad set of capabilities that extend well beyond the scope of this article. Some capabilities are real-time while others aren't real-time.
Here are some examples of real-time monitoring you can implement.
Here are some examples of other capabilities that aren't real time.
Tip
The portal in Defender for Cloud Apps is a convenient place to view activities and alerts without creating a script to extract and download the data. This advantage includes viewing data from the Power BI activity log.
Power BI is one of many applications and services that can be integrated with Defender for Cloud Apps. If you're already using Defender for Cloud Apps for other purposes, it can be used to monitor Power BI too.
Policies created in Defender for Cloud Apps are a form of DLP. The Data loss prevention for Power BI article covers DLP policies for Power BI that are set up in the Microsoft Purview compliance portal. We recommend that you use DLP policies for Power BI with the capabilities described in this article. Although there's some overlap conceptually, the capabilities are different.
Caution
This article focuses on capabilities in Microsoft Defender for Cloud Apps that can be used to monitor and protect Power BI content. There are many other capabilities in Defender for Cloud Apps that aren't covered in this article. Be sure to work with other stakeholders and system administrators to make decisions that work well for all applications and use cases.
By now, you should have completed the organization-level planning steps that were described in the Data loss prevention for Power BI article. Before proceeding, you should have clarity on:
Usually, information protection is already implemented before DLP is implemented. If sensitivity labels are published (described in the Information protection for Power BI article), they can be used in certain policies within Defender for Cloud Apps.
You might have already implemented DLP for Power BI (described in the Data loss prevention for Power BI article). Those DLP capabilities are different to the capabilities that are managed in the Microsoft Purview compliance portal. All DLP capabilities described in this article are managed in the Defender for Cloud Apps portal.
You'll need to make some key decisions before you're ready to set up policies in Defender for Cloud Apps.
The decisions related to Defender for Cloud Apps policies should directly support the goals and requirements for protecting the data that you've previously identified.
You'll need to consider which user activities you're interested in monitoring, blocking, or controlling. The policy type in Defender for Cloud Apps influences:
Access policies and session policies created in Defender for Cloud Apps allow you to monitor, block, or control user sessions in real time.
Access policies and session policies allow you to:
To provide real-time controls, access policies and session policies work with Microsoft Entra ID, relying on the reverse proxy capabilities of Conditional Access App Control. Instead of user requests and responses going through the app (the Power BI service in this case), they go through a reverse proxy (Defender for Cloud Apps).
Redirection doesn't affect the user experience. However, the URL for the Power BI service will change to https://app.powerbi.com.mcas.ms once you've set up Microsoft Entra ID for conditional access app control with Power BI. Also, users will receive a notification when they sign in to the Power BI service that announces that the app is monitored by Defender for Cloud Apps.
Important
Access policies and session policies operate in real time. Other policy types in Defender for Cloud Apps involve a short delay in alerting. Most other types of DLP and auditing also experience latency, including DLP for Power BI and the Power BI activity log.
An access policy created in Defender for Cloud Apps controls whether a user is allowed to sign in to a cloud application like the Power BI service. Organizations that are in highly regulated industries will be concerned with access policies.
Here are some examples of how you might use access policies to block access to the Power BI service.
Tip
If you have external users that access your Power BI tenant or employees who travel frequently, that can affect how you define your access control policies. These types of policies are usually managed by IT.
A session policy is useful when you don't want to allow or block access completely (which can be done with an access policy as previously described). Specifically, it allows access for the user while monitoring or limiting what actively occurs during their session.
Here are some examples of ways that you can use session policies to monitor, block, or control user sessions in the Power BI service.
Tip
Creating a session policy (for example, to prevent downloads) for content that's assigned to a particular sensitivity label, like Highly Restricted, is one of the most effective use cases for real-time session controls with Power BI.
It's also possible to control file uploads with session policies. However, typically you want to encourage self-service BI users to upload content to the Power BI service (instead of sharing Power BI Desktop files). Therefore, think carefully about blocking file uploads.
Checklist - When planning your real-time policies in Defender for Cloud Apps, key decisions and actions include:
Activity policies in Defender for Cloud Apps don't operate in real time.
You can set up an activity policy to check events recorded in the Power BI activity log. The policy can act on a single activity, or it can act on repeated activities by a single user (when a specific activity occurs more than a set number of times within a set number of minutes).
You can use activity policies to monitor activity in the Power BI service in different ways. Here are some examples of what you can achieve.
The types of activity policy alerts described in this section are commonly handled by Power BI administrators as part of their oversight of Power BI. When setting up alerts within Defender for Cloud Apps, we recommend that you focus on situations that represent significant risk to the organization. That's because each alert will need to be reviewed and closed by an administrator.
Warning
Because Power BI activity log events aren't available in real-time, they can't be used for real-time monitoring or blocking. You can, however, use operations from the activity log in activity policies. Be sure to work with your information security team to verify what's technically feasible before you get too far into the planning process.
Checklist - When planning your activity policies, key decisions and actions include:
One of the compelling reasons to integrate Power BI with Defender for Cloud Apps is to benefit from real-time controls when users interact with the Power BI service. This type of integration requires conditional access app control in Microsoft Entra ID.
Before setting up conditional access app control in Microsoft Entra ID, you'll need to consider which users will be included. Usually, all users are included. However, there might be reasons to exclude specific users.
Tip
When setting up the conditional access policy, it's likely that your Microsoft Entra administrator will exclude specific administrator accounts. That approach will prevent locking out administrators. We recommend that the excluded accounts are Microsoft Entra administrators rather than standard Power BI users.
Certain types of policies in Defender for Cloud Apps can apply to certain users and groups. Most often, these types of policies are applicable to all users. However, it's possible that you'll encounter a situation when you'll need to purposefully exclude certain users.
Checklist - When considering which users are affected, key decisions and actions include:
Having identified use cases, you'll need to consider what should happen when there's user activity that matches the policy.
When an activity is blocked in real time, it's important to provide the user with a customized message. The message is useful when you want to provide more guidance and awareness to your users during their normal workflow. It's more likely that users will read and absorb user notifications when they're:
Some types of policies in Defender for Cloud Apps can have a customized message. Here are two examples of user notifications.
Example 1: You can define a real-time session control policy that prevents all exports and downloads when the sensitivity label for the Power BI item (like a report or semantic model) is set to Highly Restricted. The customized block message in Defender for Cloud Apps reads: Files with a Highly Restricted label are not permitted to be downloaded from the Power BI service. Please view the content online in the Power BI service. Contact the Power BI support team with any questions.
Example 2: You can define a real-time access policy that prevents a user from signing in to the Power BI service when they're not using a machine managed by the organization. The customized block message in Defender for Cloud Apps reads: The Power BI service might not be accessed on a personal device. Please use the device provided by the organization. Contact the Power BI support team with any questions.
Checklist - When considering user messages in Defender for Cloud Apps, key decisions and actions include:
Alerting is useful when you want to make your security and compliance administrators aware that a policy violation has occurred. When you define policies in Defender for Cloud Apps, consider whether alerts should be generated. For more information, see alert types in Defender for Cloud Apps.
Optionally, you can set up an alert to send an email to multiple administrators. When an email alert is required, we recommend that you use a mail-enabled security group. For example, you might use a group named Security and Compliance Admin Alerting.
For high priority situations, it's possible to send alerts by text message. It's also possible to create custom alert automation and workflows by integrating with Power Automate.
You can set up each alert with a low, medium, or high severity. The severity level is helpful when prioritizing the review of open alerts. An administrator will need to review and action each alert. An alert can be closed as true positive, false positive, or benign.
Here are two examples of administrator alerts.
Example 1: You can define a real-time session control policy that prevents all exports and downloads when the sensitivity label for the Power BI item (like a report or semantic model) is set to Highly Restricted. It has a helpful customized block message for the user. However, in this situation there isn't a need to generate an alert.
Example 2: You can define an activity policy that tracks whether an external user has viewed a highly privileged report that's provided to the board of directors. A high severity alert can be set up to ensure that the activity is promptly investigated.
Tip
Example 2 highlights the differences between information protection and security. Its activity policy can help identify scenarios where self-service BI users have permission to manage security for content. Yet these users can take actions that are discouraged by the organizational policy. We recommend that you set up these types of policies only in specific circumstances when the information is especially sensitive.
Checklist - When considering alerting for administrators in Defender for Cloud Apps, key decisions and actions include:
Before you create policies in Defender for Cloud Apps, it's a good idea to first create a naming convention. A naming convention is helpful when there are many types of policies for many types of applications. It's also useful when Power BI administrators become involved in monitoring.
Tip
Consider granting Defender for Cloud Apps access to your Power BI administrators. Use the admin role, which allows viewing the activity log, sign-in events, and events related to the Power BI service.
Consider a naming convention template that includes component placeholders: <Application> - <Description> - <Action> - <Type of Policy>
Here are some naming convention examples.
Type of policy | Real-time | Policy name |
---|---|---|
Session policy | Yes | Power BI - Highly restricted label - Block downloads - RT |
Access policy | Yes | All - Unmanaged device - Block access - RT |
Activity policy | No | Power BI - Administrative activity |
Activity policy | No | Power BI - External user views executive report |
The components of the naming convention include:
There are other attributes that don't need to be included in the policy name. These attributes include the severity level (low, medium, or high), and the category (such as threat detection or DLP). Both attributes can be filtered on the alerts page.
Tip
You can rename a policy in Defender for Cloud Apps. However, it's not possible to rename the built-in anomaly detection policies. For example, the Suspicious Power BI report sharing is a built-in policy that can't be renamed.
Checklist - When considering the policy naming convention, key decisions and actions include:
Specific licenses must be in place to monitor a Power BI tenant. Administrators must have one of the following licenses.
Also, if users need to use real-time access policies or session policies in Defender for Cloud Apps, they will need an Microsoft Entra ID P1 license.
Tip
If you need clarifications about licensing requirements, talk to your Microsoft account team.
Checklist - When evaluating licensing requirements, key decisions and actions include:
Before rolling out Defender for Cloud Apps, we recommend that you create and publish user documentation. A SharePoint page or a wiki page in your centralized portal can work well because it will be easy to maintain. A document uploaded to a shared library or Teams site is a good solution, too.
The goal of the documentation is to achieve a seamless user experience. Preparing user documentation will also help you make sure you've considered everything.
Include information about who to contact when users have questions or technical issues.
FAQs and examples are especially helpful for user documentation.
Checklist - When preparing user documentation and training, key decisions and actions include:
It's important to verify who will be responsible for user support. It's common that using Defender for Cloud Apps to monitor Power BI is done by a centralized IT help desk.
You might need to create documentation for the help desk and conduct some knowledge transfer sessions to ensure the help desk is ready to respond to support requests.
Checklist - When preparing for the user support function, key decisions and actions include:
After the decisions have been made, and a rollout plan has been prepared, it's time to start the implementation.
If you intend to use real-time policies (session policies or access policies), your first task is to set up Microsoft Entra conditional access app control. You'll need to set up the Power BI service as a catalog app that will be controlled by Defender for Cloud Apps.
When Microsoft Entra Conditional Access app control is set up and tested, you can then create policies in Defender for Cloud Apps.
Important
We recommend that you introduce this functionality to a small number of test users first. There's also a monitor-only mode that you might find helpful to introduce this functionality in an orderly way.
The following checklist includes a summarized list of the end-to-end implementation steps. Many of the steps have other details that were covered in previous sections of this article.
Checklist - When implementing Defender for Cloud Apps with Power BI, key decisions and actions include:
Tip
These checklist items are summarized for planning purposes. For more details about these checklist items, see the previous sections of this article.
For more specific information about deploying Power BI as a catalog application in Defender for Cloud Apps, see the steps to deploy catalog apps.
After you've completed the implementation, you should direct your attention to monitoring, enforcing, and adjusting Defender for Cloud Apps policies based on their usage.
Power BI administrators and security and compliance administrators will need to collaborate from time to time. For Power BI content, there are two audiences for monitoring.
It's possible to provide your Power BI administrators with a limited view in Defender for Cloud Apps. It uses a scoped role to view the activity log, sign-in events, and events related to the Power BI service. This capability is a convenience for Power BI administrators.
Checklist - When monitoring Defender for Cloud Apps, key decisions and actions include:
In the next article in this series, learn about auditing for information protection and data loss prevention for Power BI.
Events
Power BI DataViz World Championships
14 Feb, 4 pm - 31 Mar, 4 pm
With 4 chances to enter, you could win a conference package and make it to the LIVE Grand Finale in Las Vegas
Learn moreTraining
Learning path
Use advance techniques in canvas apps to perform custom updates and optimization - Training
Use advance techniques in canvas apps to perform custom updates and optimization
Certification
Microsoft Certified: Information Protection and Compliance Administrator Associate - Certifications
Demonstrate the fundamentals of data security, lifecycle management, information security, and compliance to protect a Microsoft 365 deployment.