Summary
As a security administrator at Contoso, you've been involved with implementing Microsoft Defender for Cloud Apps to help Contoso meet its security goals. As part of this process, you investigated the use of Defender for Cloud Apps to help detect and identify security threats. To help identify and mitigate threats in your on-premises environment, you decided to integrate Defender for Cloud Apps and Microsoft Defender for Identity.
Now that you've completed this module, you should be able to:
- Create threat protection policies in Defender for Cloud Apps
- Integrate Defender for Cloud Apps with Microsoft Defender for Identity
- Detect threats and manage alerts
- Detect malware
Learn more
- Threat protection policies
- Microsoft Defender for Identity in Microsoft Defender for Cloud Apps
- Microsoft Defender for Identity activity filtering and policies in Microsoft Defender for Cloud Apps
- Monitor alerts raised in Defender for Cloud Apps
- Create anomaly detection policies in Defender for Cloud Apps
- Create session policies in Defender for Cloud Apps