We've renamed Microsoft Cloud App Security. It's now called Microsoft Defender for Cloud Apps. In the coming weeks, we'll update the screenshots and instructions here and in related pages. For more information about the change, see this announcement. To learn more about the recent renaming of Microsoft security services, see the Microsoft Ignite Security blog.
Microsoft Defender for Cloud Apps gives you visibility into all the activities from your connected apps. After you connect Defender for Cloud Apps to an app using the App connector, Defender for Cloud Apps scans all the activities that happened - the retroactive scan time period differs per app - and then it's updated constantly with new activities.
For a full list of Office 365 activities monitored by Defender for Cloud Apps, see Search the audit log in the Office 365 Security & Compliance Center
The Activity log can be filtered to enable you to find specific activities. You create policies based on the activities and then define what you want to be alerted about and act on. You are able to search for activities performed on certain files. The type of activities and the information we get for each activity depends on the app and what kind of data the app can provide.
For example, you can use the Activity log to find users in your organization who are using operating systems or browsers that are out of date, as follows: After you connect an app to Defender for Cloud Apps in the Activity log page, use the advanced filter and select User agent tag. Then select Outdated browser or Outdated operating system.
The basic filter provides you with great tools to get started filtering your activities.
To drill down into more specific activities, you can expand the basic filter by clicking Advanced.
The Legacy tag is added to any activity policy that use the older "user" filter. This filter will continue to work as usual. If you want to remove the Legacy tag, you can remove the filter and add the filter again using the new User name filter.
The Activity drawer
Working with the Activity drawer
You can view more information about each activity, by clicking on the Activity itself in the Activity log. This opens the Activity drawer that provides the following additional actions and insights for each activity:
Matched policies: Click on the Matched policies link to see a list of policies this activity matched.
View raw data: Click on View raw data to see the actual data that was received from the app.
User: Click on the user to view the user page for the user who performed the activity.
Device type: Click on device type to view the raw user agent data.
Location: Click on the location to view the location in Bing maps.
IP address category and tags: Click on the IP tag to view the list of IP tags found in this activity. You can then filter by all activities matching this tag.
The fields in the Activity drawer provide contextual links to additional activities and drill downs you may want to perform from the drawer directly. For example, if you move your cursor next to the IP address category, you can use the add to filter icon to add the IP address immediately to the filter of the current page. You can also use the settings cog icon that pops up to arrive directly at the settings page necessary to modify the configuration of one of the fields, such as User groups.
You can also use the icons at the top of the tab to:
- View activities of the same type
- View all activities of the same user
- View activities from the same IP address
- View activities from the same geographic location
- View activities from the same time period (48 hours)
For a list of governance actions available, see Activity governance actions.
The investigation experience includes insights about the acting user. With a single click, you can get a comprehensive overview of the user including which location they connected from, how many open alerts are they're involved with and their metadata information.
To view user insights:
Click on the Activity itself in the Activity log.
Then click on the User tab.
Clicking opens the Activity drawer User tab provides the following insights about the user:
- Open alerts: The number of open alerts that involved the user.
- Matches: The number of policy matches for files owned by the user.
- Activities: The number of activities performed by the user in the past 30 days.
- Countries: The number of countries the user connected from in the past 30 days.
- ISPs: The number of ISPs the user connected from in past 30 days.
- IP addresses: The number of IP addresses the user connected from in past 30 days.
IP address insights
Because IP address information is crucial for almost all investigations, you can view detailed information about IP addresses in the Activity drawer. From within a specific activity, you can click on the IP address tab to view consolidated data about the IP address including the number of open alerts for the specific IP address, a trend graph of recent activity, and a location map. This enables easy drill down when investigating impossible travel alerts for example. You can easily understand where the IP address was used and if it was involved in suspicious activities or not. You can also perform actions directly in the IP address drawer that enable you to tag an IP address as risky, VPN, or corporate to ease future investigation and policy creation.
To view IP address insights:
Click on the Activity itself in the Activity log.
Then click on the IP address tab.
This opens the Activity drawer IP address tab, which provides the following insights about the IP address:
- Open alerts: The number of open alerts that involved the IP address.
- Activities: The number of activities performed by the IP address in the past 30 days.
- IP location: The geographic locations from which the IP address connected from in the past 30 days.
- Activities: The number of activities performed from this IP address in past 30 days.
- Admin activities: The number of administrative activities performed from this IP address in past 30 days.
- You can perform the following IP address actions:
- Tag as Corporate IP and add to allowed list
- Tag as VPN IP address and add to allowed list
- Tag as Risky IP and add to blocked list
When an IP address is tagged as corporate, it is reflected in the portal, and the IP addresses are excluded from triggering specific detections (for example, impossible travel) because these IP addresses are considered trusted.
You can export all user activities to a CSV file.
In the Activity log, in the top right corner, click the Export button.
This article provides steps for how to delete personal data from the device or service and can be used to support your obligations under the GDPR. If you’re looking for general info about GDPR, see the GDPR section of the Service Trust portal.
If you run into any problems, we're here to help. To get assistance or support for your product issue, please open a support ticket.