


The following new anomaly detection policies are available out-of-the-box and automatically enabled: For a list of supported log parsers, see Supported firewalls and proxies. Now Cloud Discovery includes a built-in log parser to support ContentKeeper log formats. New Cloud Discovery ContentKeeper log parserĬloud App Security Cloud Discovery analyzes a wide range of traffic logs to rank and score apps. Multiple VM creation activities: Alerts you when a user performs an unusual number of VM creation activities, compared to the learned baseline. For example, attackers often turn off auditing in CloudTrail to hide the footprints of their attack. Suspicious AWS logging service changes (preview): Alerts you when a user makes changes to the CloudTrail logging service. To start customizing, go to the Settings page, and under Cloud Access App Control, select User monitoring. You can now display your organization's logo and customize the message shown. We've launched the ability for admins to personalize the landing page that your users see when navigating to a app that a Session policy is applied to. Now Cloud Discovery's built-in log parser supports the Ironport WSA 10.5.1 log format.Ĭustomizable user landing page for session controls Visibility into all activities performed through the admin console and API calls.Ībility to create custom policies and use predefined templates to alert on risky events.Īll GCP activities are covered by our anomaly detection engine and will automatically alert on any suspicious behavior, such as impossible travel, suspicious mass activities, and activity from a new country.įor more information, see Connect Google Cloud Platform to Microsoft Cloud App Security.Ĭloud App Security now includes new built-in Activity policy templates for Google Cloud Platform security best practices.Ĭloud App Security Cloud Discovery analyzes a wide range of traffic logs to rank and score apps. The connection provides you with a powerful set of tools to protect your GCP environment, including: This enables you to seamlessly connect and monitor all your GCP workloads with Cloud App Security. Google Cloud Platform connector (preview)Ĭloud App Security is extending its IaaS monitoring capabilities beyond Amazon Web Services and Azure and now supports Google Cloud Platform.

View data in Power BI with out-of-the-box dashboards or build your own visualizations.Įnjoy longer retention periods with Log Analytics.įor more information, see Azure Sentinel integration. Sharing alert and discovery data with Azure Sentinel provides the following benefits:Įnable correlation of discovery data with other data sources for deeper analysis.
Wow slider goodgle drive update#
Customers using pattern matching for the portal URL should update the pattern to reflect this change.ĭiscovery data in Azure Sentinel (preview)Ĭloud App Security now integrates with Azure Sentinel. The portal URL format (CS1) for activity and alert information sent by Cloud App Security to SIEMs has changed to and no longer contains the data center location.
Wow slider goodgle drive archive#
This article is an archive that describes updates made in past releases of Defender for Cloud Apps. To learn more about the recent renaming of Microsoft security services, see the Microsoft Ignite Security blog. For more information about the change, see this announcement. In the coming weeks, we'll update the screenshots and instructions here and in related pages. It's now called Microsoft Defender for Cloud Apps. We've renamed Microsoft Cloud App Security.
