1.6 Secure Cloud Apps with Microsoft Defender for Cloud Apps
Secure Cloud Apps and Services with Microsoft Defender for Cloud Apps
Domain 3 — Manage Incident Response: "Investigate and remediate security risks identified by Microsoft Defender for Cloud Apps."
Introduction
Defender for Cloud Apps (formerly Microsoft Cloud App Security) is a Cloud Access Security Broker (CASB) that provides visibility into cloud application usage, detects anomalous behavior, and enforces data protection policies across both Microsoft and third-party SaaS applications.
This subsection teaches you what Defender for Cloud Apps monitors, how it detects threats like OAuth abuse and data exfiltration, and how to investigate and respond to cloud app alerts. This product is particularly important for Module 11 (AiTM investigation) because the attacker’s post-compromise activity — inbox rule creation, mailbox access, OAuth app consent — is detected by Defender for Cloud Apps.
What Defender for Cloud Apps protects
| Capability | What it does | Investigation value |
|---|---|---|
| Cloud Discovery | Identifies all SaaS applications used in the organization (including shadow IT) | Reveals unauthorized applications that may pose data leakage risk |
| App connectors | Connects to SaaS APIs (M365, Salesforce, Google, etc.) for deep activity monitoring | Provides CloudAppEvents data for investigation |
| Conditional Access App Control | Proxies user sessions to enforce real-time access controls | Blocks download of sensitive files, monitors clipboard activity |
| OAuth app governance | Monitors OAuth app registrations and consent grants | Detects consent phishing (Module 15 topic), overprivileged apps |
| Anomaly detection policies | Built-in ML-based detection for impossible travel, mass download, suspicious inbox rules | Generates alerts for post-compromise behavior |
Key CloudAppEvents investigation patterns
| |
| Timestamp | AccountDisplayName | RuleDetails (truncated) |
|---|---|---|
| 08:15 | Jordan Morrison | ...MoveToFolder: "Deleted Items", SubjectContains: "invoice"... |
Response actions
| Action | When to use |
|---|---|
| Revoke OAuth app | Malicious app granted consent — revoke its permissions immediately |
| Suspend user | Account compromise detected in cloud apps — suspend prevents further cloud activity |
| Require re-authentication | Force step-up auth via conditional access app control |
| Governance actions | Automated responses: revoke app, notify user, require re-auth |
Check your understanding
1. An attacker creates an inbox rule on j.morrison's mailbox that forwards all emails containing "invoice" to an external address. Which Defender product detects this?