Summary

Completed

In this module, you saw how Microsoft Defender for Cloud Apps brings visibility, data controls, and threat protection to your cloud apps. You reviewed the four elements in the Defender for Cloud Apps framework, and you saw how to use Cloud Discovery to find out which apps are being used in your organization. Finally, you looked at how to apply Conditional Access principles to your cloud apps and created an access policy that stops users from sharing sensitive information in Teams IMs.

Now that you have completed this module, you should be able to:

  • Define the Defender for Cloud Apps Framework
  • Understand how Cloud Discovery gives you visibility into your organization
  • Explain how Conditional Access App Control policies can monitor and control access to applications
  • Understand how to classify and protect your information
  • Understand how to use anomaly detection policies to detect threats in your cloud environment