In this video we discuss how cloud app security can help you identify when users authorize OAuth apps, detect risky apps and revoke access to risky apps in Microsoft's Cloud Access Security Broker (CASB).
For more information, please visit our website: https://aka.ms/mcas
Learn more and get started with our technical documentation https://docs.microsoft.com/en-us/cloud-app-security/investigate-risky-oauth
For more information, please visit our website: https://aka.ms/mcas
Learn more and get started with our technical documentation https://docs.microsoft.com/en-us/cloud-app-security/investigate-risky-oauth
- Category
- Software
Sign in or sign up to post comments.
Be the first to comment
Up Next
-
Identify enterprise-ready cloud apps with Microsoft Cloud App Security
by Jeva 214 Views -
Shadow IT discovery & control with Microsoft Defender ATP and Cloud App Security
by Jeva 233 Views -
Configuring admin roles and RBAC in Microsoft Cloud App Security
by Jeva 158 Views -
Cloud Security Architect | Cloud Security Architect Jobs | Cloud Security | Security Technology
by ava 115 Views -
Creating custom threat detection policies in Microsoft Cloud App Security
by Jeva 175 Views -
Overview of Threat Protection capabilities in Microsoft Cloud App Security
by Jeva 159 Views -
Configuring IP addresses and ranges in Microsoft Cloud App Security
by Jeva 158 Views -
Connecting apps to Microsoft Cloud App Security
by Jeva 175 Views -
Managing the cloud app lifecycle with Microsoft Cloud App Security
by Jeva 186 Views -
Protect Cloud storage apps with Microsoft Cloud App Security
by Jeva 188 Views -
Investigate Shadow IT with Microsoft Cloud App Security
by Jeva 139 Views -
Label and protect all of your data in the cloud with Microsoft Cloud App Security
by Jeva 213 Views -
Configure automtic alerts when new apps are discovered with Microsoft CLoud App Security
by Jeva 128 Views -
Microsoft Cloud App Security - A uniquely integrated Cloud Access Security Broker
by Jeva 245 Views -
Configuring and importing user groups to Microsoft Cloud App Security
by Jeva 170 Views -
Configuring a scoped deployment for Microsoft Cloud App Security
by Jeva 162 Views -
Know where your data is stored and be GDPR compliant with Microsoft Cloud App Security
by Jeva 168 Views -
Surface Security – Chip to Cloud Modern Endpoint Protection from Microsoft
by ava 135 Views -
Configuring real-time monitoring and Control with Microsoft Cloud App Security
by Jeva 160 Views -
Identify and protect overexposed data in the cloud with Microsoft Cloud App Security
by Jeva 182 Views -
Configuring anomaly detection policies with Microsoft Cloud App Security
by Jeva 167 Views -
Microsoft Cloud helps Temenos with data security
by lily 239 Views
Add to playlist
Sorry, only registred users can create playlists.