In this video we show you how to add your organization's IP address ranges to remove complexities from policy creation, investigation and improve the accuracy of your alerts in Microsoft Cloud App Security, Microsoft's Cloud Access Security Broker (CASB).
For more information, please visit out website: https://aka.ms/mcas
Learn more and get started with our technical documentation https://docs.microsoft.com/en-us/cloud-app-security/ip-tags
For more information, please visit out website: https://aka.ms/mcas
Learn more and get started with our technical documentation https://docs.microsoft.com/en-us/cloud-app-security/ip-tags
- Category
- Software
Sign in or sign up to post comments.
Be the first to comment
Up Next
-
Know where your data is stored and be GDPR compliant with Microsoft Cloud App Security
by Jeva 226 Views -
Configuring a scoped deployment for Microsoft Cloud App Security
by Jeva 229 Views -
Configuring real-time labelling and protection of sensitive files with Microsoft Cloud App Security
by Jeva 214 Views -
Configuring admin roles and RBAC in Microsoft Cloud App Security
by Jeva 209 Views -
Protect Cloud storage apps with Microsoft Cloud App Security
by Jeva 242 Views -
Alfred Security App | Alfred Home Security App Using old Smart Mobiles | Alfred Security App Review
by ava 192 Views -
Configuring a read-only mode for external users with Microsoft Cloud App Security
by Jeva 218 Views -
Configuring a policy to block uploads in real-time with Microsoft Cloud App Security
by Jeva 214 Views -
Managing the cloud app lifecycle with Microsoft Cloud App Security
by Jeva 251 Views -
Intel addresses Meltdown and Spectre security flaws at CES 2018
by lily 182 Views -
Configuring zero trust with Microsoft Endpoint Manager
by ava 186 Views -
Microsoft Cloud App Security - A uniquely integrated Cloud Access Security Broker
by Jeva 303 Views -
Label and protect all of your data in the cloud with Microsoft Cloud App Security
by Jeva 287 Views -
Identify enterprise-ready cloud apps with Microsoft Cloud App Security
by Jeva 273 Views -
Identify and protect overexposed data in the cloud with Microsoft Cloud App Security
by Jeva 246 Views -
Cloud Security Architect | Cloud Security Architect Jobs | Cloud Security | Security Technology
by ava 183 Views -
Configuring and importing user groups to Microsoft Cloud App Security
by Jeva 231 Views -
Discover and manage risky OAuth apps in Microsoft Cloud App Security
by Jeva 204 Views -
Shadow IT discovery & control with Microsoft Defender ATP and Cloud App Security
by Jeva 289 Views -
Configuring anomaly detection policies with Microsoft Cloud App Security
by Jeva 215 Views -
Creating custom threat detection policies in Microsoft Cloud App Security
by Jeva 231 Views -
Configuring real-time monitoring and Control with Microsoft Cloud App Security
by Jeva 236 Views
Add to playlist
Sorry, only registred users can create playlists.




