Explore your cloud apps with Cloud Discovery

Completed

You can use Cloud Discovery to see what's happening in your network. You'll see both the cloud apps you expect and the ones you don't, signs of Shadow IT, and nonsanctioned apps that might not be compliant with your security and compliance policies. Cloud Discovery analyzes your traffic logs against a catalog of more than 16,000 cloud apps. Cloud Discovery ranks each app and scores it based on more than 80 risk factors to give you visibility into cloud use, Shadow IT, and the risk it poses in your organization.

The Cloud Discovery dashboard provides an at-a-glance overview of what kinds of apps are being used, your open alerts, and the risk levels of the apps in your organization. You can also see who your top app users are and where each app comes from (on an App Headquarters map). You can filter the data collected by Cloud Discovery to generate specific views depending on what interests you most.

Review the Cloud Discovery Dashboard

Your first step is to get a general picture of your cloud apps. Start at the Cloud Discovery dashboard then move through its elements in the following order to understand what's happening in your organization.

  1. Start with the High-level usage overview to see the overall cloud app use. You can see the top users and source IP addresses. Based on this information, identify which users in your organization use cloud apps the most. You'll want to pay attention to these users going forward.
  2. Dive one level deeper to see which category of apps your organization uses most. See how much of this usage is in Sanctioned apps.
  3. Go even deeper on the Discovered apps tab. See all the apps in a specific category.
  4. Review the risk score for the discovered apps in the App risk overview. Each discovered app is assessed against risk factors like security and compliance and regulatory measures. Apps are given a risk score between 1 and 10.
  5. View where discovered apps are located (based on their headquarters) in the App Headquarters map.
  6. If you find an app that poses a risk to your organization, you can flag it as Unsanctioned in the Discovered apps pane.

If your organization is using Microsoft Defender for Endpoint (or a similar solution), any unsanctioned app is automatically blocked.

If you don't have a threat protection solution, you can run a script against the data source to block the app. Then users will see a notification that the application is blocked when they try to access it.