Applies to: Microsoft Cloud App Security

Activities

Microsoft Cloud App Security gives you visibility into all the activities from your connected apps. After you connect Cloud App Security to an app using the App connector, Cloud App Security scans all the activities that happened - the retroactive scan time period differs per app - and then it is updated constantly with new activities.

Note

For a full list of Office 365 activities monitored by Cloud App Security, see Search the audit log in the Office 365 Security & Compliance Center

The Activity log can be filtered to enable you to find specific activities. You can create policies based on the activities and then define what you want to be alerted about and act on. You can also search for activities performed on certain files. The type of activities and the information we get for each activity depends on the app and what kind of data the app can provide.

For example, you can use the Activity log to find users in your organization who are using operating systems or browsers that are out of date, as follows: After you connect an app to Cloud App Security in the Activity log page, use the advanced filter and select User agent tag. Then select Outdated browser or Outdated operating system.

Activity outdated browser example

The basic filter provides you with great tools to get started filtering your activities.

basic activity log filter

To drill down into more specific activities, you can expand the basic filter by clicking Advanced.

advanced activity log filter

Note

The Legacy tag is added to any activity policy that use the older "user" filter. This filter will continue to work as usual. If you want to remove the Legacy tag, you can remove the filter and add the filter again using the new User name filter.

The Activity drawer

Working with the Activity drawer

You can view more information about each activity, by clicking on the Activity itself in the Activity log. This opens the Activity drawer that provides the following additional actions and insights for each activity:

  • Matched policies: Click on the Matched policies link to see a list of policies this activity matched.

  • View raw data: Click on View raw data to see the actual data that was received from the app.

  • User: Click on the user to view the user page for the user who performed the activity.

  • Device type: Click on device type to view the raw user agent data.

  • Location: Click on the location to view the location in Bing maps.

  • IP address category and tags: Click on the IP tag to view the list of IP tags found in this activity. You can then filter by all activities matching this tag.

The fields in the Activity drawer provide contextual links to additional activities and drill downs you may want to perform from the drawer directly. For example, if you move your cursor next to the IP address category, you can use the add to filter icon add to filter to add the IP address immediately to the filter of the current page. You can also use the settings cog icon settings icon that pops up to arrive directly at the settings page necessary to modify the configuration of one of the fields, such as User groups.

You can also use the icons at the top of the tab to:

  • View activities of the same type
  • View all activities of the same user
  • View activities from the same IP address
  • view activities from the same geographic location
  • View activities from the same time period (48 hours)

activity drawer

For a list of governance actions available, see Activity governance actions.

User insights

The investigation experience includes out-of-the-box insights about the acting user. With a single click, you can get a comprehensive overview of the user including which location they connected from, how many open alerts are they are involved with and their metadata information.

To view user insights:

  1. Click on the Activity itself in the Activity log.

  2. Then click on the User tab.
    This opens the Activity drawer User tab provides the following insights about the user:

    • Open alerts: The number of open alerts that involved the user.
    • File violation: The number of file violations for files owned by the user.
    • Activities: The number of activities performed by the user in the past 30 days.
    • Countries: The number of countries the user connected from in the past 30 days.
    • ISPs: The number of ISPs the user connected from in past 30 days.
    • IP addresses: The number of IP addresses the user connected from in past 30 days.

user insights in Cloud App Security

IP address insights

Because IP address information is crucial for almost all investigations, you can view detailed information about IP addresses in the Activity drawer. From within a specific activity, you can click on the IP address tab to view consolidated data about the IP address including the number of open alerts for the specific IP address, a trend graph of recent activity and a location map. This enables easy drill down, for example when investigating impossible travel alerts, you can easily understand where the IP address was used and if it was involved in suspicious activities or not. You can also perform actions directly in the IP address drawer that enable you to tag an IP address as risky, VPN, or corporate to ease future investigation and policy creation.

To view IP address insights:

  1. Click on the Activity itself in the Activity log.

  2. Then click on the IP address tab.
    This opens the Activity drawer IP address tab, which provides the following insights about the IP address:

    • Open alerts: The number of open alerts that involved the IP address.
    • Activities: The number of activities performed by the IP address in the past 30 days.
    • IP location: The geographic locations from which the IP address connected from in the past 30 days.
    • Activities: The number of activities performed from this IP address in past 30 days.
    • Admin activities: The number of administrative activities performed from this IP address in past 30 days.
    • You can perform the following IP address actions:
      • Tag as risky
      • Tag as VPN IP address
      • Tag as Risky IP and add to blocked group

IP address insights in Cloud App Security

Export activities

You can export all user activities to a CSV file.

In the Activity log, in the top right corner, click the Export button export button.

Note

This article provides steps for how to delete personal data from the device or service and can be used to support your obligations under the GDPR. If you’re looking for general info about GDPR, see the GDPR section of the Service Trust portal.

See Also

Daily activities to protect your cloud environment

Premier customers can also choose Cloud App Security directly from the Premier Portal.