Bendrinti naudojant


Recommended Microsoft Defender for Cloud Apps policies for SaaS apps

Microsoft Defender for Cloud Apps builds on Microsoft Entra Conditional Access policies to enable real-time monitoring and control of granular actions with SaaS apps, such as blocking downloads, uploads, copy and paste, and printing. This feature adds security to sessions that carry inherent risk, such as when corporate resources are accessed from unmanaged devices or by guest users.

Defender for Cloud Apps also integrates natively with Microsoft Purview Information Protection, providing real-time content inspection to find sensitive data based on sensitive information types and sensitivity labels and to take appropriate action.

This guidance includes recommendations for these scenarios:

  • Bring SaaS apps into IT management
  • Tune protection for specific SaaS apps
  • Configure Microsoft Purview data loss prevention (DLP) to help comply with data protection regulations

Bring SaaS apps into IT management

The first step in using Defender for Cloud Apps to manage SaaS apps is to discover these and then add them to your Microsoft Entra tenant. If you need help with discovery, see Discover and manage SaaS apps in your network. After you've discovered apps, add these to your Microsoft Entra tenant.

You can begin to manage these by doing the following:

  1. First, in Microsoft Entra ID, create a new conditional access policy and configure it to "Use Conditional Access App Control." This redirects the request to Defender for Cloud Apps. You can create one policy and add all SaaS apps to this policy.
  2. Next, in Defender for Cloud Apps, create session policies. Create one policy for each control you want to apply.

Permissions to SaaS apps are typically based on business need for access to the app. These permissions can be highly dynamic. Using Defender for Cloud Apps policies ensures protection to app data, regardless of whether users are assigned to a Microsoft Entra group associated with starting point, enterprise, or specialized security protection.

To protect data across your collection of SaaS apps, the following diagram illustrates the necessary Microsoft Entra Conditional Access policy plus suggested policies you can create in Defender for Cloud Apps. In this example, the policies created in Defender for Cloud Apps apply to all SaaS apps you're managing. These are designed to apply appropriate controls based on whether devices are managed as well as sensitivity labels that are already applied to files.

Diagram that shows the policies for managing SaaS apps in Defender for Cloud Apps.

The following table lists the new conditional access policy you must create in Microsoft Entra ID.

Protection level Policy More information
All protection levels Use Conditional Access App Control in Defender for Cloud Apps This configures your IdP (Microsoft Entra ID) to work with Defender for Cloud Apps.

This next table lists the example policies illustrated above that you can create to protect all SaaS apps. Be sure to evaluate your own business, security, and compliance objectives and then create policies that provide the most appropriate protection for your environment.

Protection level Policy
Starting point Monitor traffic from unmanaged devices

Add protection to file downloads from unmanaged devices

Enterprise Block download of files labeled with sensitive or classified from unmanaged devices (this provides browser only access)
Specialized security Block download of files labeled with classified from all devices (this provides browser only access)

For end-to-end instructions for setting up Conditional Access App Control, see Deploy Conditional Access App Control for featured apps. This article walks you through the process of creating the necessary conditional access policy in Microsoft Entra ID and testing your SaaS apps.

For more information, see Protect apps with Microsoft Defender for Cloud Apps Conditional Access App Control.

Tune protection for specific SaaS apps

You might want to apply additional monitoring and controls to specific SaaS apps in your environment. Defender for Cloud Apps allows you to accomplish this. For example, if an app like Box is used heavily in your environment, it makes sense to apply more controls. Or, if your legal or finance department is using a specific SaaS app for sensitive business data, you can target extra protection to these apps.

For example, you can protect your Box environment with these types of built-in anomaly detection policy templates:

  • Activity from anonymous IP addresses
  • Activity from infrequent country/region
  • Activity from suspicious IP addresses
  • Impossible travel
  • Activity performed by terminated user (requires Microsoft Entra ID as IdP)
  • Malware detection
  • Multiple failed login attempts
  • Ransomware activity
  • Risky Oauth App
  • Unusual file share activity

These are examples. Additional policy templates are added regularly. For examples of how to apply additional protection to specific apps, see Protecting connected apps.

How Defender for Cloud Apps helps protect your Box environment demonstrates the types of controls that can help you protect your business data in Box and other apps with sensitive data.

Configure data loss prevention (DLP) to help comply with data protection regulations

Defender for Cloud Apps can be a valuable tool for configuring protection for compliance regulations. In this case, you create specific policies to look for specific data that a regulation applies to and configure each policy to take appropriate action.

The following illustration and table provide several examples of policies that can be configured to help comply with the General Data Protection Regulation (GDPR). In these examples, policies look for specific data. Based on the sensitivity of the data, each policy is configured to take appropriate action.

Diagram that shows the Defender for Cloud Apps policies for data loss prevention page.

Protection level Example policies
Starting point Alert when files containing this sensitive information type ("Credit Card Number") are shared outside the organization

Block downloads of files containing this sensitive information type ("Credit card number") to unmanaged devices

Enterprise Protect downloads of files containing this sensitive information type ("Credit card number") to managed devices

Block downloads of files containing this sensitive information type ("Credit card number") to unmanaged devices

Alert when a file with on of these labels is uploaded to OneDrive for Business or Box (Customer data, Human Resources: Salary Data, Human Resources, Employee data)

Specialized security Alert when files with this label ("Highly classified") are downloaded to managed devices

Block downloads of files with this label ("Highly classified") to unmanaged devices

Next steps

For more information about using Defender for Cloud Apps, see Microsoft Defender for Cloud Apps documentation.