Integrate Microsoft Defender for Endpoint with Microsoft Defender for Cloud Apps


This document focuses on shadow IT discovery capabilities from Defender for Endpoint logs. For more information on shadow IT governing capabilities via Defender for Endpoint, see Govern discovered apps using Microsoft Defender for Endpoint.

Microsoft Defender for Cloud Apps integrates with Microsoft Defender for Endpoint natively. The integration simplifies roll out of Cloud Discovery, and enables device-based investigation. Microsoft Defender for Endpoint is a security platform for intelligent protection, detection, investigation, and response. Defender for Endpoint protects endpoints from cyber threats, detects advanced attacks and data breaches, automates security incidents, and improves security posture.

Defender for Cloud Apps uses the traffic information collected by Defender for Endpoint about the cloud apps and services being accessed from IT-managed devices specified in the prerequisites below.

The integration doesn't require any additional deployment and can be enabled directly from the settings in Defender for Endpoint and Microsoft Defender XDR. You don't need to route or mirror traffic from your endpoints or do complex integration steps. Logs from your endpoints sent to Defender for Cloud Apps provide user and device information for traffic activities. Pairing device context with the username provides a full picture across your network enabling you to determine which user did which activity from which device.

Additionally, when you identify a risky user, you can check all the devices the user accessed to detect potential risks. If you identify a risky device, check all the users who used it to detect further potential risks.

Once traffic information is collected, you're ready to deep dive into cloud app use in your organization. Defender for Cloud Apps takes advantage of Defender for Endpoint Network Protection capabilities to block endpoint device access to cloud apps. For more information about governing the discovered apps, see Govern discovered apps using Microsoft Defender for Endpoint.



Microsoft Defender Antivirus is highly recommended for Discovery but not mandatory; some Discovery data is still available when Defender Antivirus is disabled.

How it works

On its own, Defender for Cloud Apps collects logs from your endpoints using either logs you upload or by configuring automatic log upload. Native integration enables you to take advantage of the logs Defender for Endpoint's agent creates when it runs on Windows and monitors network transactions. Use this information for Shadow IT discovery across the Windows devices on your network.

Watch our videos showing the benefits of using Defender for Endpoint with Defender for Cloud Apps.

How to integrate Microsoft Defender for Endpoint with Defender for Cloud Apps

To enable Defender for Endpoint integration with Defender for Cloud Apps:

  1. In Microsoft Defender XDR, from the navigation pane, select Settings.

  2. Select Endpoints.

  3. Under General, select Advanced features.

  4. Toggle the Microsoft Defender for Cloud Apps to On.

  5. Select Apply.


    It takes up to two hours after you enable the integration for the data to show up in Defender for Cloud Apps.

    Defender for Endpoint settings.

To configure the severity for alerts sent to Microsoft Defender for Endpoint:

  1. In the Microsoft Defender Portal, select Settings. Then choose Cloud Apps. Under Cloud Discovery, select Microsoft Defender for Endpoint.

  2. Under Alerts, select the global severity level for alerts.

  3. Select Save.

    Defender for Endpoint alert settings.

Next steps

If you run into any problems, we're here to help. To get assistance or support for your product issue, please open a support ticket.