Integrate Defender for Cloud Apps with iboss

Note

Microsoft Defender for Cloud Apps is now part of Microsoft 365 Defender and can be accessed through its portal at: https://security.microsoft.com. Microsoft 365 Defender correlates signals from the Microsoft Defender suite across endpoints, identities, email, and SaaS apps to provide incident-level detection, investigation, and powerful response capabilities. It improves your operational efficiency with better prioritization and shorter response times which protect your organization more effectively. For more information about these changes, see Microsoft Defender for Cloud Apps in Microsoft 365 Defender.

If you work with both Defender for Cloud Apps and iboss, you can integrate the two products to enhance your security Cloud Discovery experience. iboss is a standalone secure cloud gateway that monitors your organization's traffic and enables you to set policies that block transactions. Together, Defender for Cloud Apps and iboss provide the following capabilities:

  • Seamless deployment of Cloud Discovery - Use iboss to proxy your traffic and send it to Defender for Cloud Apps. This eliminates the need for installation of log collectors on your network endpoints to enable Cloud Discovery.
  • iboss's block capabilities are automatically applied on apps you set as unsanctioned in Defender for Cloud Apps.
  • Enhance your iboss admin portal with the Defender for Cloud Apps risk assessment of the top 100 cloud apps in your organization, which can be viewed directly in the iboss admin portal.

Prerequisites

  • A valid license for Microsoft Defender for Cloud Apps
  • A valid license for iboss secure cloud gateway (release 9.1.100.0 or later)

Deployment

  1. In the Microsoft 365 Defender portal, do the following integration steps:

    1. Select Settings. Then choose Cloud Apps.

    2. Under Cloud Discovery, select Automatic log upload. Then select +Add data source.

    3. In the Add data source page, enter the following settings:

      • Name = iboss
      • Source = iboss Secure Cloud Gateway
      • Receiver type = Syslog - UDP

      data source iboss.

    4. Select View sample of expected log file. Then select Download sample log to view a sample discovery log, and make sure it matches your logs.

  2. Investigate cloud apps discovered on your network. For more information and investigation steps, see Working with Cloud Discovery.

  3. Any app that you set as unsanctioned in Defender for Cloud Apps will be pinged by iboss once every ten minutes, and then automatically blocked by iboss. For more information about unsanctioning apps, see Sanctioning/unsanctioning an app.

  4. To configure iboss to send traffic logs to Microsoft Defender for Cloud Apps, contact iboss support.

Next steps

If you run into any problems, we're here to help. To get assistance or support for your product issue, please open a support ticket.