Activities

Note

Microsoft Defender for Cloud Apps (previously known as Microsoft Cloud App Security) is now part of Microsoft 365 Defender. The Microsoft 365 Defender portal allows security admins to perform their security tasks in one location. This will simplify workflows, and add the functionality of the other Microsoft 365 Defender services. Microsoft 365 Defender will be the home for monitoring and managing security across your Microsoft identities, data, devices, apps, and infrastructure. For more information about these changes, see Microsoft Defender for Cloud Apps in Microsoft 365 Defender.

Microsoft Defender for Cloud Apps gives you visibility into all the activities from your connected apps. After you connect Defender for Cloud Apps to an app using the App connector, Defender for Cloud Apps scans all the activities that happened - the retroactive scan time period differs per app - and then it's updated constantly with new activities.

Note

For a full list of Office 365 activities monitored by Defender for Cloud Apps, see Search the audit log in the compliance center.

The Activity log can be filtered to enable you to find specific activities. You create policies based on the activities and then define what you want to be alerted about and act on. You can search for activities performed on certain files. The type of activities and the information we get for each activity depends on the app and what kind of data the app can provide.

For example, you can use the Activity log to find users in your organization who are using operating systems or browsers that are out of date, as follows: After you connect an app to Defender for Cloud Apps in the Activity log page, use the advanced filter and select User agent tag. Then select Outdated browser or Outdated operating system.

Activity outdated browser example.

The basic filter provides you with great tools to get started filtering your activities.

basic activity log filter.

To drill down into more specific activities, you can expand the basic filter by selecting Advanced.

advanced activity log filter.

Note

The Legacy tag is added to any activity policy that use the older "user" filter. This filter will continue to work as usual. If you want to remove the Legacy tag, you can remove the filter and add the filter again using the new User name filter.

The Activity drawer

Working with the Activity drawer

You can view more information about each activity, by selecting the Activity itself in the Activity log. This opens the Activity drawer that provides the following additional actions and insights for each activity:

  • Matched policies: Select the Matched policies link to see a list of policies this activity matched.

  • View raw data: Select View raw data to see the actual data that was received from the app.

  • User: Select the user to view the user page for the user who performed the activity.

  • Device type: Select Device type to view the raw user agent data.

  • Location: Select the location to view the location in Bing maps.

  • IP address category and tags: Select the IP tag to view the list of IP tags found in this activity. You can then filter by all activities matching this tag.

The fields in the Activity drawer provide contextual links to additional activities and drill downs you may want to perform from the drawer directly. For example, if you move your cursor next to the IP address category, you can use theadd to filter icon add to filter. to add the IP address immediately to the filter of the current page. You can also use the settings cog icon settings icon. that pops up to arrive directly at the settings page necessary to modify the configuration of one of the fields, such as User groups.

You can also use the icons at the top of the tab to:

  • View activities of the same type
  • View all activities of the same user
  • View activities from the same IP address
  • View activities from the same geographic location
  • View activities from the same time period (48 hours)

activity drawer.

For a list of governance actions available, see Activity governance actions.

User insights

The investigation experience includes insights about the acting user. With a single click, you can get a comprehensive overview of the user including which location they connected from, how many open alerts are they're involved with and their metadata information.

To view user insights:

  1. Select the Activity itself in the Activity log.

  2. Then select the User tab.
    Selecting it opens the Activity drawer User tab provides the following insights about the user:

    • Open alerts: The number of open alerts that involved the user.
    • Matches: The number of policy matches for files owned by the user.
    • Activities: The number of activities performed by the user in the past 30 days.
    • Countries: The number of countries the user connected from in the past 30 days.
    • ISPs: The number of ISPs the user connected from in past 30 days.
    • IP addresses: The number of IP addresses the user connected from in past 30 days.

user insights in Defender for Cloud Apps.

IP address insights

Because IP address information is crucial for almost all investigations, you can view detailed information about IP addresses in the Activity drawer. From within a specific activity, you can select the IP address tab to view consolidated data about the IP address including the number of open alerts for the specific IP address, a trend graph of recent activity, and a location map. This enables easy drill down when investigating impossible travel alerts for example. You can easily understand where the IP address was used and if it was involved in suspicious activities or not. You can also perform actions directly in the IP address drawer that enable you to tag an IP address as risky, VPN, or corporate to ease future investigation and policy creation.

To view IP address insights:

  1. Select the Activity itself in the Activity log.

  2. Then select the IP address tab.
    This opens the Activity drawer IP address tab, which provides the following insights about the IP address:

    • Open alerts: The number of open alerts that involved the IP address.
    • Activities: The number of activities performed by the IP address in the past 30 days.
    • IP location: The geographic locations from which the IP address connected from in the past 30 days.
    • Activities: The number of activities performed from this IP address in past 30 days.
    • Admin activities: The number of administrative activities performed from this IP address in past 30 days.
    • You can perform the following IP address actions:
      • Set as a Corporate IP and add to allowlist
      • Set as a VPN IP address and add to allowlist
      • Set as a Risky IP and add to denylist

    Note

    To avoid raising impossible travel alerts when employees connect from their home locations via the corporate VPN, it's recommended to tag the IP address as VPN.

IP address insights in Defender for Cloud Apps.

Export activities

You can export all user activities to a CSV file.

In the Activity log, in the top-right corner, select the Export button.

export button.

Note

This article provides steps for how to delete personal data from the device or service and can be used to support your obligations under the GDPR. If you’re looking for general info about GDPR, see the GDPR section of the Service Trust portal.

Next steps

If you run into any problems, we're here to help. To get assistance or support for your product issue, please open a support ticket.