In this video we discuss how cloud app security can help you identify when users authorize OAuth apps, detect risky apps and revoke access to risky apps in Microsoft's Cloud Access Security Broker (CASB).
For more information, please visit our website: https://aka.ms/mcas
Learn more and get started with our technical documentation https://docs.microsoft.com/en-us/cloud-app-security/investigate-risky-oauth
For more information, please visit our website: https://aka.ms/mcas
Learn more and get started with our technical documentation https://docs.microsoft.com/en-us/cloud-app-security/investigate-risky-oauth
- Category
- Software
Sign in or sign up to post comments.
Be the first to comment
Up Next
-
Configure automtic alerts when new apps are discovered with Microsoft CLoud App Security
by Jeva 167 Views -
Configuring real-time monitoring and Control with Microsoft Cloud App Security
by Jeva 213 Views -
Cloud Security Architect | Cloud Security Architect Jobs | Cloud Security | Security Technology
by ava 162 Views -
Microsoft Cloud helps Temenos with data security
by lily 272 Views -
Configuring anomaly detection policies with Microsoft Cloud App Security
by Jeva 206 Views -
Managing the cloud app lifecycle with Microsoft Cloud App Security
by Jeva 235 Views -
Identify enterprise-ready cloud apps with Microsoft Cloud App Security
by Jeva 258 Views -
Microsoft Cloud App Security - A uniquely integrated Cloud Access Security Broker
by Jeva 286 Views -
Investigate Shadow IT with Microsoft Cloud App Security
by Jeva 177 Views -
Configuring a scoped deployment for Microsoft Cloud App Security
by Jeva 206 Views -
Configuring admin roles and RBAC in Microsoft Cloud App Security
by Jeva 195 Views -
Surface Security – Chip to Cloud Modern Endpoint Protection from Microsoft
by ava 183 Views -
Protect Cloud storage apps with Microsoft Cloud App Security
by Jeva 223 Views -
Identify and protect overexposed data in the cloud with Microsoft Cloud App Security
by Jeva 226 Views -
Shadow IT discovery & control with Microsoft Defender ATP and Cloud App Security
by Jeva 276 Views -
Know where your data is stored and be GDPR compliant with Microsoft Cloud App Security
by Jeva 209 Views -
Configuring a read-only mode for external users with Microsoft Cloud App Security
by Jeva 205 Views -
Label and protect all of your data in the cloud with Microsoft Cloud App Security
by Jeva 271 Views -
Configuring IP addresses and ranges in Microsoft Cloud App Security
by Jeva 207 Views -
Connecting apps to Microsoft Cloud App Security
by Jeva 230 Views -
Configuring and importing user groups to Microsoft Cloud App Security
by Jeva 213 Views -
Overview of Threat Protection capabilities in Microsoft Cloud App Security
by Jeva 211 Views
Add to playlist
Sorry, only registred users can create playlists.