Configure real-time application access monitoring with Microsoft Defender for Cloud Apps and Microsoft Entra ID
Artiklu
Use Microsoft Defender for Cloud Apps for real-time monitoring with on-premises application in Microsoft Entra ID. Defender for Cloud Apps uses Conditional Access App Control to monitor and control sessions in real-time based on Conditional Access policies. Apply these policies to on-premises applications that use application proxy in Microsoft Entra ID.
Some examples of the policies you create with Defender for Cloud Apps include:
Block or protect the download of sensitive documents on unmanaged devices.
Monitor when high-risk users sign on to applications, and then log their actions from within the session. With this information, you can analyze user behavior to determine how to apply session policies.
Use client certificates or device compliance to block access to specific applications from unmanaged devices.
Restrict user sessions from noncorporate networks. You can give restricted access to users accessing an application from outside your corporate network. For example, this restricted access can block the user from downloading sensitive documents.
Add an on-premises application to Microsoft Entra ID. For a quickstart, see Add an on-premises app to Microsoft Entra ID. When adding the application, be sure to set two settings in the Add your on-premises application page so it works with Defender for Cloud Apps:
Pre Authentication: Enter Microsoft Entra ID.
Translate URLs in Application Body: Choose Yes.
Test the on-premises application
After adding your application to Microsoft Entra ID, use the steps in Test the application to add a user for testing, and test the sign-on.
This module focuses on effectively managing identities and enhancing security in Microsoft Enterprise Identity, ensuring that users, groups, and external identities are protected against security threats and unauthorized access.
Learn answers to frequently asked questions (FAQ) about using Microsoft Entra application proxy to publish internal, on-premises applications to remote users.
Understand why to use application proxy to publish on-premises web applications externally to remote users. Learn about application proxy architecture, connectors, authentication methods, and security benefits.