Microsoft Cloud App Security is Microsoft CASB (Cloud Access Security Broker) and is a critical component of the Microsoft Cloud Security stack. It's a comprehensive solution that can help your organization as you move to take full advantage of the promise of cloud applications, but keeps you in control through improved visibility into activity. It also helps increase the protection of critical data across cloud applications (Microsoft and 3rd parties). With tools that help uncover shadow IT, assess risk, enforce policies, investigate activities, and stop threats, your organization can more safely move to the cloud while maintaining control of critical data.
The diagram below describe typical use cases for CASB's.
!IMAGEMCAS intro
This lab will guide you through some of Microsoft Cloud App Security (MCAS) capabilities and top use cases.
===
!IMAGELab environment
- Client01 is a Windows 10 VM that will be used to access Office 365 and Cloud app Security management consoles and configure the log collector running on LinuxVM, using Putty.
- LinuxVM is an Ubuntu 18.04 computer on which we install Docker to run the Cloud App Security Discovery log collector.
- Office 365 and Cloud App Security are test tenants for the labs.
- Office 365:
https://portal.office.com
- Cloud App Security:
https://portal.cloudappsecurity.com
- Security & Compliance Center:
https://protection.office.com
- Windows Defender ATP:
https://securitycenter.windows.com
===
[!ALERT] Before going to the different labs section, please be sure to complete the environment preparation.
The different Cloud App Security capabilities covered in the labs are:
- Management
- Cloud apps Discovery
- Information Protection
- Conditional Access App Control with Office 365
- Threat Detection
- Management with PowerShell
- Log collector troubleshooting
- Conditional Access App Control with 3rd party apps
❓ If you have questions or want to go further in your Cloud App Security journey, join our Tech community !
===
Manage admin access: 🕙 5 min
For this task, you are asked to delegate admin access to monitor a dedicated group of users for a specific region, without adding them to the Global Admin management role.
[!KNOWLEDGE] Cloud App Security Global admin role is not the same as the Office 365 Global admin role. [!KNOWLEDGE] Although the Office 365 Global admins are automatically granted the Cloud App Security Global admin role, you can grant users MCAS Global Admin role without adding them to the Office 365 Global admins.
In this lab, we are going to delegate the management of US employees to a new administrator (mcasadminUS). This administrator will only see those users alerts and activities for the users bieing members of the group US employees.
-
[] On @lab.VirtualMachine(Client01).SelectLink log in with the password [email protected](Client01).Password+++.
-
[] In a in Private Browsing session navigate to the
https://portal.cloudappsecurity.com
-
[] Click on the Gear and under the Data Enrichement section, select User groups
[!HINT] The import can take up to one hour. Cloud App Security has to synchronize the Azure AD groups before importing them. [!HINT] If the import takes too long, don't hesitate to move to the next section and come back to complete this task.
^IMAGE[Open Screenshot](\Media\mgmt-import1.png "Import group")
-
Click on Import user group
!IMAGEImport group
-
Select an app to import group from: Office 365(AzureAD)
^IMAGEOpen Screenshot
-
The user group will be seen as Importing.
!IMAGEImport group
[!NOTE] While the import is happening, head over to Delegate MCAS administration to an external admin and come back to this portion of the lab once you've completed that section section. The import will be completed and you continue with the steps below.
-
-
[] In the Cloud App Security portal
https://portal.cloudappsecurity.com
, add mcasAdminUS as User group admin for the US employees group.-
Click on the Gear under System, and select Manage admin access
^IMAGEOpen Screenshot
-
Click on the + icon.
^IMAGEOpen Screenshot
-
Type the admin user name:
mcasadminus@@lab.CloudCredential(134).TenantName
[!HINT] The tenant name is the one provided for your lab environment. This information is available in your Resources section, at the top of the instructions.
^IMAGEOpen Screenshot
[!KNOWLEDGE] Group admin has permissions to all of the data in Microsoft Cloud App Security that deals exclusively with the specific group selected here. The admin can view and modify information in Microsoft Cloud App Security only for that user group. [!KNOWLEDGE] For more details about admin roles
https://docs.microsoft.com/en-us/cloud-app-security/manage-admins
-
Select Role: User group admin
^IMAGEOpen Screenshot
-
Select groups for this admin**: US employees
-
Click on Add admin
!IMAGENew admin
-
The user should be populated with the role and scope you selected.
!IMAGENew admin
-
-
[] Open a new private tab and connect to the [Cloud App Security portal]
https://portal.cloudappsecurity.com
with mcasAdminUS and compare the activities, alerts and actions that this scoped admin can perform compared to your regular Global admin account.mcasadminus@@lab.CloudCredential(134).TenantName
pass@word1
[!NOTE] As you can see, this administrator can not see Discovery data, Files or Alerts that are not related to the users from the group he/she manages.
!IMAGENew admin
As a Managed Security Service Providers (MSSPs), you are asked by your customer how you could access their environment to manage their alerts in the Cloud App Security portal. In this lab, we will see how to answer to that question.
[!ALERT] For this task, work with the person next to you to configure an external access for the Managed Security Service Provider to another MCAS tenant. You will need that person's tenant name that can be found in the Resources section, at the top of the instructions. [!ALERT] Both attendees need to perform the operation in parralel. [!ALERT]^IMAGEOpen Screenshot
-
[] Browse to
https://portal.cloudappsecurity.com
and add the external MCAS admin (your neighboor's admin username) as Security reader in your MCAS tenant.-
Click on the Gear under System and select Manage admin access.
^IMAGEOpen Screenshot
-
Click on the + icon.
^IMAGEOpen Screenshot
-
Type Admin user name: *Use your neighbor's credentials provided in their tenant as the external admin.
-
Select type of role for this admin:Security Reader
^IMAGEOpen Screenshot
-
Click on Add Admin
^IMAGEOpen Screenshot
[!HINT] Note here that the icon next to the newly added admin shows that the user is external to the company. !IMAGEExternal admin
-
-
[] After adding the external admin, log off and log on again from Cloud App Security.
^IMAGEOpen Screenshot
-
[] Switch to the external Cloud App Security tenant where you have been added as an external admin and compare at the actions you can perform using this security role as external admin.
!IMAGESwitch
===
On average, more than 1,100 cloud applications are used by enterprises today, of which 61% are not sanctioned by IT. This results in duplicate capabilities, apps not meeting compliance standards or posing a security risk to the organization without any IT oversight. Discovery identifies current cloud apps, provides risk assessments and ongoing analytics and lifecycle management capabilities to control the use.
!IMAGEDiscovery
To provide this visibility on Shadow IT and cloud apps usage, Cloud App Security ingest and analyze network logs from proxy, firewall but also from Windows 10 clients within or ouside the corporate network, using the native integration with Windows Defender ATP.
!IMAGEDiscovery intro
Once the logs have been analyzed, Cloud App Security provides the visibility on Shadow IT and alerts you when it detects risky apps or anomalous usage.
!IMAGEDiscovery intro
[!NOTE] In this lab, we will simulate the upload of network logs from a SQUID proxy to analyze the apps used withing your company. We will not test the Windows Defender ATP integration at it can take up to 2h before the logs are parsed and the results are visible in the console.
===
===
In this lab, we will create a Discovery Snapshot report. Snapshot Reports is the manual method of uploading files into Cloud App Security. This process is a great and easy way to validate your logs format of have a quick look at the Cloud App Security Discovery capability. You can upload batches of 20 logs of 1 GB max at a time and they will parse into their own separate report. Any discovery policies you create will not apply to these types of reports.
To create snapshot reports:
-
[] Go to the Discover section and click on Create snapshot report.
^IMAGEOpen Screenshot
-
[] In the Add data source window, use the settings below (do not close the window yet) and click on View and verify....
Report Name **Demo report**
Description Data Source SQUID (Common) Anonymize private information Check the Box -
[] Click on View and Verify in the window and then click on the Download sample log button and save it to your desktop.
!IMAGEOpen Screenshot
^IMAGEOpen Screenshot
-
[] Close that window.
-
[] Click on the Browse button and in the new window, select the log you downloaded and click Open.
^IMAGEOpen Screenshot
^IMAGEOpen Screenshot
-
[] Now that the log has been selected, click on the Create button to create your report.
^IMAGEOpen Screenshot
-
[] Your report will then be processed. It will take a couple of minutes before it's marked as Ready.
!IMAGEReport processing
!IMAGEReport processing
-
[] Once your report is marked as ready, click on the text Ready. You will be redirected to your snapshot report where you can start exploring the discovered apps, users, IPs. Your instructor can give you more details on how to use the dashboard.
^IMAGEOpen Screenshot
!IMAGEReport dashboard
!IMAGEReport dashboard -risk
===
In this lab, we will implement Continuous reports. Continuous reports analyze all logs that are forwarded from your network using Cloud App Security. They provide improved visibility over all data, and automatically identify anomalous use using either the Machine Learning anomaly detection engine or by using custom policies that you define.
These reports can be created by connecting in the following ways:
-
Windows Defender ATP Integration: Cloud App Security integrates with Windows Defender Advanced Threat Protection (ATP) natively, to simplify rollout of Cloud Discovery, extend Cloud Discovery capabilities beyond your corporate network, and enable machine-based investigation.
-
Log Collector: Log collectors enable you to easily automate log upload from your network. The log collector runs on your network and receives logs over Syslog or FTP.
-
Zscaler Integration: If you work with both Cloud App Security and Zscaler, you can integrate the two products to enhance your security Cloud Discovery experience. Together, Cloud App Security and Zscaler provide seamless deployment of Cloud Discovery, automatic blocking of unsanctioned apps, and risk assessment directly in the Zscaler portal.
!IMAGEZscaler
In this lab you will perform the configuration of a Log collector.
[!ALERT] After completing this portion of the lab and validating that your logs have been successfully uploaded and processed by MCAS, you will not immediately see a loaded Discovery Dashboard. Due to Cloud Discovery logs being parsed twice a day.
[!HINT] For this lab, the Docker engine has been pre-installed on LinuxVM in your lab environment, but normally you have to configure it on your host using the command below. [!HINT] The command downloads a script installing the Docker engine on your host computer (Ubuntu in this case) and pull the latest Cloud App Security collector image from the Docker library.
[!KNOWLEDGE] curl -o /tmp/MCASInstallDocker.sh https://adaprodconsole.blob.core.windows.net/public-files/MCASInstallDocker.sh && chmod +x /tmp/MCASInstallDocker.sh; /tmp/MCASInstallDocker.sh
-
[] Switch to @lab.VirtualMachine(Client01).SelectLink and log in with the password [email protected](Client01).Password+++.
-
[] Create a new tab in the in a Private window and browse to
https://portal.cloudappsecurity.com
.>```@lab.CloudCredential(134).Username``` > >```@lab.CloudCredential(134).Password```
-
[] In the Cloud App Security dashboard, click on the Gear icon and select Log collectors.
^IMAGE[Open Screenshot](\Media\dis-settings.png "Settings")
-
[] On the Data sources tab, click the Add data source... button.
^IMAGE[Open Screenshot](\Media\dis-newsource.png "New data source")
-
[] In the Add data source window, use the settings below (do not close the window yet):
Name **SquidLogs**
Source SQUID (Common) Receiver type FTP Anonymize private information Check the Box ^IMAGEOpen Screenshot
[!KNOWLEDGE] In this lab we use FTP as the receiver type but usually companies will use Syslog.
-
[]Click Add in the Add data source dialog.
^IMAGEOpen Screenshot
[!HINT] We just created a data source which is the logical representation of the network appliance data source type the log collector will receive.
-
[] Next, click on the Log collectors tab and click the Add log collector... button.
!IMAGEAdd log collector
-
[] In the Create log collector dialog, provide the settings below and click the Update button.
Name LogCollector
Host IP address 192.168.141.125
Data source(s) SquidLogs ^IMAGEOpen Screenshot
-
[] After clicking on the Update button, follow the required steps to create your log collector instance which will be hosted within the LinuxVM. You'll have to use the provided command line in Putty in the following steps to configure your log collector.
[!ALERT] Do not close this window until your log collector is up and running!
!IMAGECreate log collector command
[!KNOWLEDGE] This command line contains the different parameters to instantiate a new log collector on the Linux host: [!KNOWLEDGE] An API token to connect to Cloud App Security for uploading the logs: 1f5b5fb2a0d778e3d57f26ca5ab11574db0751166477940528ccf19a7c4 [!KNOWLEDGE] The docker parameters to configure the log collector container: docker run ...
-
[] Copy the command line provided at the end of the previous step and minimize the browser.
-
[] Open Putty (64-bit). You should have the icon on your desktop.
^IMAGEOpen Screenshot
-
[] In the PuTTY Configuration window, enter
**192.168.141.125**
and click Open.^IMAGEOpen Screenshot
-
[] At the Putty warning message, click Yes.
[!KNOWLEDGE] This warning is due to the ssh certificate provided by LinuxVM not being trusted by your computer. You can safely ignore this warning in this lab.
^IMAGEOpen Screenshot
-
[] Log in using the credentials below.
Username Password user01 Passw0rd1 [!HINT] The password doesn't appear in the command prompt when you type it. You can safely press enter to validate the credentials.
!IMAGEOpen Screenshot
-
[] Type the command below and press Enter. Provide the user password when prompted.
sudo -i
Passw0rd1
^IMAGEOpen Screenshot
[!KNOWLEDGE] The previous command elevates your permissions in the Linux environment like the UAC prompt would do on a Windows machine.
-
[] Return to the Create log collector dialog.
-
[] Copy the collector configuration command from step 2 and run it in the PuTTY window.
^IMAGEOpen Screenshot !IMAGENew container
[!KNOWLEDGE] The output of this command is the id of the newly created container/log collector.
-
[] Launch the WinSCP application from Client01 start menu.
^IMAGEOpen Screenshot
-
[] Use the details below in the WinSCP window to connect to the log collector FTP service.
File Protocol Host name User name Password FTP 192.168.141.125
discovery
BP98Jw4Ns*zpTFrH
^IMAGEOpen Screenshot
[!HINT] this information was provided during the log collector creation.
-
[] You should then be able to see a folder with your data source name (SquidLogs).
!IMAGEWinSCP connection
[!ALERT] If you are not able to connect to the log collector FTP service, verify that you successfully created the new log collector instance within Putty in previous steps.
-
[] On the left pane, move to the Desktop folder and drag your example Squid log (From Step 7) into the folder named for your data source (SquidLogs). After some minutes, the log collector will upload your logs.
!IMAGELog upload !IMAGELog upload !IMAGELog upload
-
[] Return to the Cloud App Security portal and click on the Gear icon and select Governance log.
^IMAGEOpen Screenshot
-
[] Verify the status of the uploaded logs.
^IMAGEOpen Screenshot
[!NOTE] The status you see is the parsing status of the logs. Parsing status can be successful, pending or failed.
-
[] You can also verify the Last data received date on the Data sources tab under Automatic log upload in the settings.
!IMAGELast data received
-
[] Go to the Cloud Discovery Dashboard to verify the discovered apps. As explained at the beginning of the lab, the data you uploaded is probably not already available as the data is analyzed twice a day.
!IMAGEOpen Screenshot
!IMAGEOpen Screenshot
===
In a perfect world, all your employees understand the importance of information protection and work within your policies. But in a real world, it's probable that a partner who works with accounting uploads a document to your Box repository with the wrong permissions, and a week later you realize that your enterprise's confidential information was leaked to your competition. Microsoft Cloud App Security helps you prevent this kind of disaster before it happens.
!IMAGEIP
===
File policies are a great tool for finding threats to your information protection policies, for instance finding places where users stored sensitive information, credit card numbers and third-party ICAP files in your cloud. With Cloud App Security, not only can you detect these unwanted files stored in your cloud that leave you vulnerable, but you can take im/mediate action to stop them in their tracks and lock down the files that pose a threat. Using Admin quarantine, you can protect your files in the cloud and remediate problems, as well as prevent future leaks from occurring.
In this lab, we are going to configure a file policy to apply an Azure Information Protection template on documents containing social security numbers. This method could be compared to the Azure Information Protection Scanner for documents that are stored on file servers.
-
[] In the Cloud App Security portal, go to Control and then click on Policies.
!IMAGEOpen Screenshot
-
[] Create a Policy click on File policy.
^IMAGEOpen Screenshot
-
[] Provide the following settings to that policy:
Policy Name Protect SSN documents in sensitive site
Files matching all of the following App equals Box Apply to All Files ^IMAGEOpen Screenshot
-
[] In the inspection method, select Data Classification Service.
^IMAGEOpen Screenshot
[!KNOWLEDGE] Microsoft Data Classification Service provides a unified information protection experience across Office 365, Azure Information Protection, and Microsoft Cloud App Security. [!KNOWLEDGE] [!KNOWLEDGE] The classification service allows you to extend your data classification efforts to the third-party cloud apps protected by Cloud App Security, using the decisions you already made across an even greater number of apps.
-
[] Click on Choose inspection type and then on sensitive information type.
^IMAGEOpen Screenshot
-
Search and select the all the information types matching
SSN
and click on Done.[!HINT] Be sure to select the checkboxes as clicking on the name do not select the information type.
!IMAGESSN type
-
[] Click on the Unmask the last 4 characters of a match and the Create an alert for each matching file checkboxes.
^IMAGEOpen Screenshot
[!KNOWLEDGE] In production scenarios, as you will probably have thousands of matches, you will not create alerts but use the policy matches approach instead.
-
[] In the Governance actions, click on Box and select Apply classification label. Select the Highly Confidental - All Employees label.
[!ALERT] If you are not able to select Azure Information Protection templates, verify that you configured the integration in the prerequisites section or that you waited the 1h for the classifications to sync. In addition log out of the Cloud App Security Portal and log back in and see and if you're able to apply the label.
!IMAGEgov
- [] Click Create to finish the policy creation.
In this lab, we are going to configure a file policy to quarantine sensitive PDF files that are shared externally, so an admin can review those files and validate if they could or not be shared externally. Admin quarantine can also be used to isolate files that should not have been uploaded to cloud storage apps.
-
[] In the Cloud App Security portal, go to Control and then click on Policies.
!IMAGEOpen Screenshot
-
[] Create a Polick and click on File policy that will determine which files should be placed in quarantine.
^IMAGEOpen Screenshot
-
[] Provide the following settings to that policy:
Policy name Files matching all of the following Quarantine sensitive pdf
Extension equals pdf and Access level equals Public, External ^IMAGEOpen Screenshot
-
[] Check the Create an alert for each matching file checkBox.
-
[] In Governance actions of the policy, select Put in admin quarantine for Box and click on the Create button.
!IMAGEUnmask
We are now going to test our files policies by performing the following actions.
-
[] On Client01, unzip the content of the Demo files.zip.
-
[] Go to the Box files
https://app.box.com/folder/0
-
[] Upload the unzipped files to the site.
^IMAGEOpen Screenshot
-
[] After upload is complete, share the PDF document named Protect with Microsoft Cloud App Security proxy.pdf
^IMAGEOpen Screenshot
^IMAGEOpen Screenshot
-
[] Cloud App Security will now scan those documents and search for matches to your created policies.
[!HINT] The scan can take several minutes before completion.
-
[] To monitor the evolution of the scan, go back to Cloud App Security, select Investigate and open the Files page.
^IMAGEOpen Screenshot
-
[] You can search for the files you uploaded using different criteria, like file name, type, ... or just look at all the files discovered by Cloud App Security. When a policy match is discovered, you will notice it on this page by looking at the icones next to the file name. You will also have icons related to the applied Governance action (AIP label or Admin Quarantine in our lab).
^IMAGEOpen Screenshot
-
[] To open the details of the file, click on its name. You can see there the matched policies and the scan status of the files.
^IMAGEScan status
-
[] You can also view the related governance actions, like applying the Azure Information classification or moving the file to the quarantine folder, at the file level or in the Governance log.
!IMAGEGovernance log
-
[] As we configured Alerts in our lab, you can also review the related alerts in the Alerts page.
^IMAGEAlert
^IMAGEAlert
-
[] If you go back to Box, you will also notice that the quarantined files will be replaced by placeholders. The original file will be moved to the Quarantine.
[!KNOWLEDGE] For Box, the quarantine folder location and user message can't be customized. The folder location is the drive of the admin who connected Box to Cloud App Security. For SharePoint and OneDrive, the location and the message can be customized in Cloud App Security settings.
^IMAGEOpen Screenshot
^IMAGEOpen Screenshot
-
[] The other way to review the policy matches is to go back to the Policies page and look at the matches number.
!IMAGEMatches
===
⬅️ MCAS Home 🕙 15 min
Conditional Access App Control utilizes a reverse proxy architecture and is uniquely integrated with Azure AD conditional access. Azure AD conditional access allows you to enforce access controls on your organization’s apps based on certain conditions. The conditions define who (for example a user, or group of users) and what (which cloud apps) and where (which locations and networks) a conditional access policy is applied to. After you’ve determined the conditions, you can route users to the Microsoft Cloud App Security where you can protect data with Conditional Access App Control by applying access and session controls.
Conditional Access App Control enables user app access and sessions to be monitored and controlled in real time based on access and session policies.
!IMAGEAAD portal
[!NOTE] App Control Access and Session policies give you the capability to the following:
- Block on download: You can block the download of sensitive documents. For example, on unmanaged devices.
- Protect on download: Instead of blocking the download of sensitive documents, you can require documents to be protected via encryption on download. This ensures that the document is protected, and user access is authenticated, if the data is downloaded to an untrusted device.
- Monitor low-trust user sessions: Risky users are monitored when they sign into apps and their actions are logged from within the session. You can investigate and analyze user behavior to understand where, and under what conditions, session policies should be applied in the future.
- Block access: You can completely block access to specific apps for users coming from unmanaged devices or from non-corporate networks.
- Create read-only mode: By monitoring and blocking custom in-app activities you can create a read-only mode to specific apps for specific users.
- Restrict user sessions from non-corporate networks: Users accessing a protected app from a location that is not part of your corporate network, are allowed restricted access and the download of sensitive materials is blocked or protected.
===
===
-
[] Go to the Azure portal
https://portal.azure.com
and open the Azure Active Directory blade.^IMAGEOpen Screenshot
-
[] Scroll down to Security and click on Conditional Access.
^IMAGEOpen Screenshot
-
[] Create a new conditional access policy with the following settings:
Name Assignments Apps Office365 AppControl All users Exchange, SharePoint -
Click on New Policy
^IMAGEOpen Screenshot
-
Name it
Office365 App Control
-
Under assignments: Click on All users and then Done
^IMAGEOpen Screenshot
-
Go to the next section: Cloud Apps: Select Apps and choose Office 365 Exchange Online and Office 365 SharePoint Online and Done
^IMAGEOpen Screenshot
-
Under Acess Controls, click on Session and check off Use Conditional Access App Control
^IMAGEOpen Screenshot
-
Click on ON in Enable the policy and click Create
^IMAGEOpen Screenshot
-
-
[] Sign out of the Azure Portal and close you browser.
-
[] Open your browser and go to the Exchange Web App
https://outlook.office.com
. -
[] Connect using :
@lab.CloudCredential(134).Username
@lab.CloudCredential(134).Password
[!HINT] This is done to force the use of conditional access. Once a session has been redirected to Cloud App Security, you will be able to configure the application for App Control in Cloud App Security.
-
[] Go back to Cloud App Security
https://portal.cloudappsecurity.com
, click on the Gear icon and click on Conditional Access App Control.^IMAGEOpen Screenshot
[!HINT] You will see that Exchange Online has now appeared as an application and can now be configured.
^IMAGEOpen Screenshot
-
[] Click on Continue setup to enable session control and click on Add.
^IMAGEOpen Screenshot
^IMAGEOpen Screenshot
-
[] You are now notified that the application is under Session Control.
!IMAGESetup
-
[] On the left hand side click on Control and then Policies.
!IMAGEOpen Screenshot
-
[] Click on Create Polic and click on Session policy.
^IMAGE[Open Screenshot](\Media\appc-office-7.png)
-
Name:
Proxy - Block sensitive files download
-
Under Session Control Type choose Control filedownload (with DLP)
^IMAGEOpen Screenshot
-
Add Activity Filters: Device Tag does not equal Compliant, Domain joined
-
App equals Office 365 Exchange Online and Office 365 SharePoint Online
!IMAGESession policy
-
Content inspection check Enabled Include files that match a preset expression anc choose US: PII: Social Security Number
!IMAGESession policy
-
Under Actions: go to Block
-
Click: Customize block message:
This file containes SSN information and cannot be downloaded on non-coporate devices.
-
Click: Verify that Create an alert for each matching event with the policy's severity is checked.
-
Click: Create
!IMAGESession policy
-
====
Now is time to test our configuration. We will here simulate the userexperience while accessing company apps protected by Cloud App Security from an unmanaged device
-
[] Sign out, close you browser and open the Exchange Web App
https://outlook.office.com
. Use the following credentials to connect:@lab.CloudCredential(134).Username
@lab.CloudCredential(134).Password
-
You should receive the following message, as you are redirected through Cloud App Security before accessing the application.
Click Continue to Exchange Online.
!IMAGEWarning
-
[] You are now directed to Exchange Online and your session is now passing through Cloud App Security.
[!HINT] By taking a look at the URL, you can verify that your session is actually being redirected to Cloud App Security.
!IMAGESession
-
[] To test our policy, perform the following:
-
Create a new mail and attach the Word document named Personal employees information.docx and the Excel spreadsheet named Workplace Innovation.xlsx stored on Client01 desktop. Send the mail to your user,
@lab.CloudCredential(134).Username
!IMAGETest
-
[] Wait until you receive your email in the webmail.
-
Once the message is received, click on the attached document Personal employees information.docx. This will open the file preview. As you can see, the user can access the document using the Office Online app.
!IMAGEWarning
-
[] Try now to download the Personal employees information.docx document. As this file contains social security numbers, the download will be blocked and will trigger an alert in Cloud App Security.
!IMAGETest
!IMAGETest
-
[] Now let's try to download the Workplace Innovation.xlsx spreadsheet. As this file do not contain social security numbers, the download will be allowed.
!IMAGETest
!IMAGETest
!IMAGETest
!IMAGETest
-
[!KNOWLEDGE] We just demonstrated App Control capabilities to go further than just allow/block scenarios, based on session risks. This capability can open many scenarios, like BYOD access for example.
====
Now that we validated our configuration, let's go back to the admin view.
-
[] Go back to the Cloud App Security console
https://portal.cloudappsecurity.com
-
[] Go to the Alerts page.
^IMAGEOpen Screenshot
-
[] Click on the alert generated by our policy.
!IMAGEMenu
-
[] On the alert page, you can see that the admin user tried to download a file named Personal employees information.docx but Session control blocked the download. You also see the name of the policy that triggered the alert.
!IMAGEMenu
-
[] To go further in the investigation, click on View all user activity. This will redirect you to the Activity log where you can see all the user activities.
!IMAGEMenu
-
[] By looking at the user activities, you can follow her/his trace:
===
Cloud App Security provides several threats detection policies using machine learning and user behavior analytics to detect suspicious activities across your different applications. Those policies are enabled by default and after an initial learning period, Cloud App Security will start alerting you when suspicious actions like activity from anonymous IP addresses, infrequent country, suspicious IP addresses, impossible travel, ransomware activity, suspicious inBox forwarding configuration or unusual file download are detected.
!IMAGEThret protection
===
[!ALERT] It can take up to 24 hours for the auditing in Office 365 to be configured, meaning that Cloud App Security will not receive the activities events. As many alerts relies on activities events to work, we will be using a pre-populated tenant for this portion of the lab so we can see alerts and have the ability to investigate them.
[!HINT] LOG OUT OF YOUR CURRENT CLOUD APP SECURITY TENANT AND LOG BACK IN USING THE CREDENTIALS BELOW.
Portal | Username | Password |
---|---|---|
https://portal.cloudappsecurity.com |
[email protected] | EventP@ssword |
URLs
- Office 365:
https://portal.office.com
- Cloud App Security:
https://portal.cloudappsecurity.com
- Anonymous access:
- Impossible travel:
- Activity from infrequent country:
- Malware detection:
- Email exfiltration using suspicious inBox forwarding:
- Ransomware activity:
- Suspicious application consent:
===
This detection identifies that users were active from an IP address that has been identified as an anonymous proxy IP address. These proxies are used by people who want to hide their device’s IP address, and may be used for malicious intent. This detection uses a machine learning algorithm that reduces "false positives", such as mis-tagged IP addresses that are widely used by users in the organization.
As your authentication during the previous steps came from an anonymous IP address, it will be detected as suspicious by Cloud App Security.
-
[] Go back to the Cloud App Security portal and review the alerts.
!IMAGEMCAS alerts menu
You will see an alert similar to this one:
!IMAGETOR alert
-
[] Click on the alert to open it. You see in this page more information on the alert and the related activities:
!IMAGETOR alert
-
[] Click on the activities to get more information on the specific activity, the user and the IP address:
-
[] You can go further in your investigation by looking at the related actions performed during that session by clicking on the “investigate in activity log" button:
!IMAGETOR alert
-
[] You will then be redirected to the activity log where you will be able to investigate on the actions performed during that session, like configuration changes or data exfiltration.
This detection identifies two user activities (is a single or multiple sessions) originating from geographically distant locations within a time period shorter than the time it would have taken the user to travel from the first location to the second, indicating that a different user is using the same credentials. This detection uses a machine learning algorithm that ignores obvious "false positives" contributing to the impossible travel condition, such as VPNs and locations regularly used by other users in the organization. The detection has an initial learning period of seven days during which it learns a new user’s activity pattern.
As the first and the second authentication came from distinct locations, Cloud App Security will detect that those time to travel between those two locations was to short and will then alert you.
-
[] Go back to the Cloud App Security portal and review the alerts.
!IMAGEMCAS alerts menu
You will see an alert similar to this one:
!IMAGEImpossible travel alert
-
[] The investigation steps are similar to the anonymous access but by looking at the IP address details and the ISP, you will be able to determine the possible risk:
!IMAGEImpossible travel alert
[!KNOWLEDGE] To reduce the amount of false positives, edit the impossible travel policy.
*You can adjust the policy by clicking on the alert and Resolve and click on Adjust policy.
Each anomaly detection policy can be independently scoped so that it applies only to the users and groups you want to include and exclude in the policy. For example, you can set the Activity from infrequent county detection to ignore a specific user who travels frequently.
To scope an anomaly detection policy:
- Click Control and then Policies, and set the Type filter to Anomaly detection policy.
- Click on the policy you want to scope.
- Under Scope, change the drop-down from the default setting of All users and groups, to Specific users and groups.
- Select Include to specify the users and groups for whom this policy will apply. Any user or group not selected here won't be considered a threat and won't generate an alert.
- Select Exclude to specify users for whom this policy won't apply. Any user selected here won't be considered a threat and won't generate an alert, even if they're members of groups selected under Include.
Sensitivity Slider:
You can set the sensitivity slider to determine the level of anomalous behavior needed before an alert is triggered. For example, if you set it to low, it will suppress Impossible Travel alerts from a user’s common locations, and if you set it to high, it will surface such alerts.
This detection considers past activity locations to determine new and infrequent locations. The anomaly detection engine stores information about previous locations used by users in the organization. An alert is triggered when an activity occurs from a location that wasn't recently or never visited by any user in the organization.
After an initial learning period, Cloud App Security will detect that this location was not used before by your user or other people within the organization and will then alert you.
-
[] Go back to the Cloud App Security portal and review the alerts.
!IMAGEMCAS alerts menu
You will see an alert similar to this one:
!IMAGEInfrequent country alert
-
[] The investigation steps are similar to the anonymous access but by looking at the IP address details and the ISP, you will be able to determine the possible risk. In this specific example, we see it’s coming from a TOR IP, so this authentication is suspicious:
!IMAGEInfrequent country alert
[!NOTE] Possible resolution options are available on the top bar for single click remediation.
!IMAGEInfrequent country alert
This detection identifies malicious files in your cloud storage, whether they're from your Microsoft apps or third-party apps. Microsoft Cloud App Security uses Microsoft's threat intelligence to recognize whether certain files are associated with known malware attacks and are potentially malicious. This built-in policy is disabled by default. Not every file is scanned, but heuristics are used to look for files that are potentially risky. After files are detected, you can then see a list of Infected files. Click on the malware file name in the file drawer to open a malware report that provides you with information about that type of malware the file is infected with.
-
[] Go back to the Cloud App Security portal and review the alerts.
!IMAGEMCAS alerts menu
You will see an alert similar to this one:
!IMAGEMalware detected alert
-
[] Click on the alert to open it. You see in this page more information on the alert and the related activities:
!IMAGEMalware detected alert
-
[] In the alert, you have more information on the file and its location, but also the malware that we identified:
!IMAGEMalware family
-
[] Click on the malware type link to have access to the Microsoft Threat Intelligence report regarding this file:
!IMAGEMalware family
-
[] Back in the alert, you can scroll down to the related activities. There, you will have more information on how the file was uploaded to OneDrive and possibly who downloaded it:
!IMAGEMalware family
This detection looks for suspicious email forwarding rules, for example, if a user created an inBox rule that forwards a copy of all emails to an external address.
As the rules redirects your user’s emails to a suspicious external address, Cloud App Security will detect this rule creation and will then alert you.
-
[] Go back to the Cloud App Security portal and review the alerts.
!IMAGEMCAS alerts menu
You will see an alert similar to this one:
-
[] Click on the alert to open it. You see in this page more information on the alert, like the destination address and the related activities:
-
[] With this information, you can now go back to the user to remove this rule but also investigate in Exchange trace logs which emails were sent to that destination address.
Cloud App Security extended its ransomware detection capabilities with anomaly detection to ensure a more comprehensive coverage against sophisticated Ransomware attacks. Using our security research expertise to identify behavioral patterns that reflect ransomware activity,Cloud App Security ensures holistic and robust protection. If Cloud App Security identifies, for example, a high rate of file uploads or file deletion activities it may represent an adverse encryption process. This data is collected in the logs received from connected APIs and is then combined with learned behavioral patterns and threat intelligence, for example, known ransomware extensions. For more information about how Cloud App Security detects ransomware, see Protecting your organization against ransomware.
As the rules redirects your user’s emails to a suspicious external address, Cloud App Security will detect this rule creation and will then alert you.
-
[] Go back to the Cloud App Security portal and review the alerts.
!IMAGEMCAS alerts menu
You will see an alert similar to this one:
!IMAGERansomware alert
-
[] Click on the alert to open it. You see in this page more information on the impacted user, the number of encrypted files, the location of the files and the related activities:
!IMAGERansomware alert
-
[] Now that we’ve seen the alert, let’s go back to the policies:
!IMAGEPolicies
-
[] Search for the “Ransomware activity” policy and open it:
!IMAGERansomware policy
-
[] At the bottom of the policy, review the possible alerts and governance actions:
!IMAGERansomware policy
Many third-party productivity apps that might be installed by business users in your organization request permission to access user information and data and sign in on behalf of the user in other cloud apps, such as Office 365, G Suite and Salesforce. When users install these apps, they often click accept without closely reviewing the details in the prompt, including granting permissions to the app. This problem is compounded by the fact that IT may not have enough insight to weigh the security risk of an application against the productivity benefit that it provides. Because accepting third-party app permissions is a potential security risk to your organization, monitoring the app permissions your users grant gives you the necessary visibility and control to protect your users and your applications. The Microsoft Cloud App Security app permissions enable you to see which user-installed applications have access to Office 365 data, G Suite data and Salesforce data, what permissions the apps have, and which users granted these apps access to their Office 365, G Suite and Salesforce accounts.
Here is an example of such user consent:
!IMAGEApp consent
-
[] Without even creating policies, Cloud App Security shows you the applications that received permissions from your users:
!IMAGEApp permissions
-
[] From this page, you can easily see who granted permissions to those apps, if they are commonly used or their permissions level:
!IMAGEApp commodity
-
[] If you detect that an application should not be granted access to your environment, you can revoke the app access.
IMPORTANT: This operation will apply to the entire organization:
!IMAGEApp revoke
-
[] When investigating, you can search for apps rarely used in Office 365 which were granted high privileges and create a policy to be automatically alerted when such action is performed:
!IMAGEApp filter
-
[] After clicking on the “New policy from search” button, you can see that your filter will be used to create a new policy:
!IMAGEApp policy
-
[] Go down on that page and review the possible alerts and governance automatic actions that you can configure:
!IMAGEApp policy
-
[] To go further in your investigation, let’s now pivot to the “Activity log”:
!IMAGEActivity log
-
[] In the activity log, search for "Consent to application" activities:
!IMAGEActivity log
-
[] You will then be able to investigate on who, when and from where your users granted access to applications:
!IMAGEActivity log
Now that we reviewed some of the default detection capabilities of Cloud App Security, you should start creating your own policies. Cloud App Security provides by default many has policies templates to start creating your custom policies.
-
[] To create your policies, go to “Policies”:
!IMAGEPolicies
-
[] Click on “Create policy” and select the type of policy you want to create:
!IMAGEPolicies types
-
[] In the policy screen, choose the policy template you want to use:
!IMAGEPolicies templates
-
[] Apply the template:
!IMAGEApply template
-
[] Cloud App Security will then populate the different properties of the policy:
!IMAGEPolicy template filter
-
[] Review those properties and customize them if needed.
-
[] Explore other types of policies and review the proposed templates.
===
⬅️ MCAS Home) 🕙 15 min
To help administrators interact with MCAS in a programmatic way, two Microsoft employees created a non-official PowerShell module for Cloud App Security. For this lab, you will install this module and discover the available cmdlets.
Note: the module relies on the Cloud App Security API. You can find its documentation in the MCAS portal.
!IMAGEf847xhzx.jpg
The module is available in the PowerShell gallery and can be installed
using the *Install-Module mcas*
command.
!IMAGE6j16dgs2.jpg
More information on the module is available on GitHub: https://github.com/powershellshock/MCAS-Powershell
After installing the module, read how to connect to MCAS in the PowerShell help and start exploring the cmdlets.
Hint: you'll have to create an API token in Cloud App Security.
!IMAGE0x2tzeqd.jpg
Using PowerShell:
-
[] Review the list of MCAS administrators and when they were granted those permissions
-
[] Review your security alerts and close them in bulk
-
[] Download a sample SQUID log and send it to MCAS as a snapshot report.
-
[] In the portal, in Discovery, tag some apps as unsanctioned and generate a blocking script for your appliance to block access to those apps.
-
[] You are asked to define corporate IP's in MCAS. Subnets go from 10.50.50.0/24 to 10.50.80.0/24
===
⬅️ Home 🕙 15 min
In this task, you will review possible troubleshooting steps to identify issues in automatic logs upload from the log collector. There are several things to test at different locations: in the log collector, in MCAS, at the network level.
-
cd
: Used to navigate in the directoriesExamples:
cd /var/adallom
: to go to the specified directorycd /
: to go to the root directorycd ..
: to go to the parent directory -
more
orcat
: Used to display the content of the logsExamples:
more trace.log
: to display the content of the trace.log file -
tail
: Used for outputting the last part of files -
ll
: Used to display the content of the directory as a list. This command is an alias forls -l
-
clear
: Used to clear the screen -
tab key
: Used to perform autocompletion
-
[] On Client01, open a session on PuTTY to 192.168.141.125 and use the credentials below. In the PuTTY Configuration window, enter 192.168.141.125 and click Open.
^IMAGEOpen Screenshot
Log in using the credentials below.
Username Password user01 Passw0rd1 ⚠️ The password doesn't appear in the command prompt, you can safely press enter to validate the credentials. -
[] Run the following commands:
sudo -i docker stats
!IMAGEDocker stats
[!HINT] This command will show you the status of the log collector instance.
-
[] Press
Ctrl-C
to end the command. -
[] Next, run the command below:
docker logs --details LogCollector
!IMAGEDocker log
[!HINT] This command will show you the container logs to verify if it encountered errors when initiating.
-
[] Type the following command:
docker exec -it LogCollector bash
[!HINT] This command will execute the container's bash. You will then be able to execute commands from inside of the log collector.
-
[] You can now explore the container filesystem and inspect the /var/adallom directory. This directory is where you will investigate most of the issues with the syslog or ftp logs being sent to the log collector.
cd /var/adallom ll
!IMAGEadallom folder
Go to the following folders and review their log files using
more
:- /adallom/ftp/discovery: this folder contains the data source folders where you send the log files for automated upload. This is also the default folder when logging into the collector with FTP credentials.
- /adallom/syslog/discovery: if you setup the log collector to receive syslog messages, this is where the flat file of aggregated messages will reside until it is uploaded.
- /adallom/discoverylogsbackup: this folder contains the last file that was sent to MCAS. This is useful for looking at the raw log in case there are parsing issues.
-
[] To validate that logs are correctly received from the network appliance, you can also verify the /var/log/pure-ftpd directory and check the transfer log:
tail transfer.log
!IMAGEFTP logs
-
[] Now, move to the /var/log/adallom directory.
!IMAGEvar log
Go to the following folders and review their content and log files using
ll
andmore
ortail
:- /var/log/adallom/columbus: this folder is where you will find log files useful for troubleshooting issues with the collector sending files to Cloud App Security. In the log-archive folder you can find previous logs compressed as .tar.gz files that could be used to send to support for example.
- /var/log/adallom/columbusInstaller: this is where you will investigate issues with the log collector itself. You will find here logs related to the configuration and bootstrapping of the collector. For example, trace.log will show you the bootstrapping process:
!IMAGEBootstrapping log
An easy way to test the connectivity after configuring the log collector is to download a sample of your appliance logs from and use WinSCP to connect to the log collector to upload it and see if it gets uploaded to Cloud App Security, as you did in the previous exercise
!IMAGEPending log
[!HINT] If the log stays in the source folder for too long, then you know you probably have a connection issue between the log collector and Cloud App Security and should go investigate the logs reviewed previously.
===
⬅️ MCAS Home 🕙 45 min
Conditional Access App Control utilizes a reverse proxy architecture and is uniquely integrated with Azure AD conditional access. Azure AD conditional access allows you to enforce access controls on your organization’s apps based on certain conditions. The conditions define who (for example a user, or group of users) and what (which cloud apps) and where (which locations and networks) a conditional access policy is applied to. After you’ve determined the conditions, you can route users to the Microsoft Cloud App Security where you can protect data with Conditional Access App Control by applying access and session controls.
Conditional Access App Control enables user app access and sessions to be monitored and controlled in real time based on access and session policies. Access and session policies are utilized within the Cloud App Security portal to further refine filters and set actions to be taken on a user.
With the access and session policies, you can:
- Block on download: You can block the download of sensitive documents. For example, on unmanaged devices.
- Protect on download: Instead of blocking the download of sensitive documents, you can require documents to be protected via encryption on download. This ensures that the document is protected, and user access is authenticated, if the data is downloaded to an untrusted device.
- Monitor low-trust user sessions: Risky users are monitored when they sign into apps and their actions are logged from within the session. You can investigate and analyze user behavior to understand where, and under what conditions, session policies should be applied in the future.
- Block access: You can completely block access to specific apps for users coming from unmanaged devices or from non-corporate networks.
- Create read-only mode: By monitoring and blocking custom in-app activities you can create a read-only mode to specific apps for specific users.
- Restrict user sessions from non-corporate networks: Users accessing a protected app from a location that is not part of your corporate network, are allowed restricted access and the download of sensitive materials is blocked or protected.
📝 In this lab, we will cover only some scenarios.
===
⚠️ As Conditional Access App Control requires the protected app to be federated with your IdP (Azure AD in our case), we will first federate Saleforce with our tenant before moving to the controls configuration. Please go through all the steps exactly as described to avoid any complications further in the lab.
-
[] Create a Salesforce developer account.
-
On Client01, launch a browser and create a Salesforce developer org at this address: https://developer.salesforce.com/signup. This org (or tenant) will allow you to create a test environment to federate with our Azure AD tenant.
📝 Dev Salesforce orgs are available for free but are deleted after extended periods of inactivity.
⚠️ Use your lab tenant admin user as the Email and Username!IMAGEDev sign-up
-
Fill in the rest of details, click Sign me up, accept the verification email in your mailBox, and choose a new password. Use the admin password provided in the lab environment if possible.
!IMAGEDev sign-up
!IMAGEDev sign-up
-
-
[] Configure Salesforce in Azure AD for single sign-on.
-
In Salesforce, go to Setup, search for My Domain and register a new domain matching your Office 365 lab domain, e.g., ems123456-dev-ed.salesforce.com
!IMAGEMy domain
!IMAGEMy domain
!IMAGEMy domain
-
Save full Salesforce domain name, including https:// for the next step, e.g., https://ems123456-dev-ed.salesforce.com
⚠️ Do not close this page !!IMAGEMy domain
-
Go to https://portal.azure.com were we will add Salesforce as an Enterprise application and configure single sign-on, which is a requirement for using App Control.
-
-
[] Go to Azure Active Directory, click on Enterprise applications, and add the Salesforce application. Call it SalesforceCAS, and click on Add.
!IMAGEAdd SF
!IMAGEAdd SF
!IMAGEAdd SF
!IMAGEAdd SF
-
[] Now that Salesforce has been added as an Enterprise application, we have to configure single sign-on.
!IMAGEAdd SF
-
[] Select SAML as the SSO method.
!IMAGEAdd SF
-
[] We will now configure the SAML single sign-on using the information provided by Salesforce when we added our domain.
⚠️ Do not forget to add https:// in front of the domain name provided by Salesforce.!IMAGEAdd SF
!IMAGEAdd SF
-
[] Close the pane and go to the Step 4 of the SSO wizard and click on View step-by-step instructions. This page will give you all the required information for configuring Salesforce SSO.
!IMAGEAdd SF
!IMAGEAdd SF
-
[] Go back to the Salesforce admin page and go to the Signle sign-on settings. There, click on the Edit button.
!IMAGEAdd SF
-
[] Enable single sign-on using SAML and click on the Save button.
!IMAGEAdd SF
-
[] Back on the configuration page, under SAML Single Sign-On Settings, click on New.
!IMAGEAdd SF
We will now configure those settings using the information provided in the Azure AD portal.
!IMAGEAdd SF
-
[] For the configuration, you will have to use the information provided at the bottom of the Azure AD Configure sign-on pane. Scroll down until you reach the Quick reference section.
!IMAGEAdd SF
-
[] Copy/paste the information from the Quick reference to the Salesforce single sign-on settings page.
a.In the Name textBox, type the name of the configuration: AzureAD.
b. Paste Azure AD SAML Entity ID value into the Issuer textBox.
c. In the Entity Id textBox, type in the Sign On URL that you entered in Step 1, which should be in this format: http://company.my.salesforce.com
d. Download the Azure AD Signing Certificate in the Azure portal and then click Browse to upload the downloaded certificate Azure AD Signing Certificate in the Salesforce setting page.
e. As SAML Identity Type, select Assertion contains the Federation ID from the User object.
f. As SAML Identity Location, select Identity is in the NameIdentifier element of the Subject statement.
g. Paste Azure AD Single Sign-On Service URL into the Identity Provider Login URL textBox.
h. Salesforce does not support SAML logout. As a workaround, paste Azure AD Sign Out URL into the Identity Provider Logout URL textBox.
i. As Service Provider Initiated Request Binding, select HTTP POST.
j. Click Save.
!IMAGEAdd SF
!IMAGEAdd SF
-
[] Go back to My Domain in Salesforce and in Authentication Configuration, click on Edit. You will be redirected to another page.
!IMAGEAdd SF
-
[] In Authentication Configuration, un-check the Login Page checkBox and check the Azure AD checkBox. Click on Save. When back on the configuration page, click on the login button to complete the configuration.
!IMAGEAdd SF
!IMAGEAdd SF
!IMAGEAdd SF
!IMAGEAdd SF
We will now provide access to our users and validate the SSO experience.
-
[] Go back to the Azure AD portal, within the SalesforceCAS app and choose Users and groups
!IMAGEAssign users
-
[] Click on + Add user. Choose your admin account as the user (e.g.,[email protected]) and select System Administrator as the Role. Click on Assign
!IMAGEAssign users
!IMAGEAssign users
!IMAGEAssign users
[!ALERT] If you want to assign Salesforce to more users, you must create a user for them in Salesforce as we didn't configured provisionning. Our admin account already has an an account matching his UPN, created during the Salesforce configuration.
-
[] Test the setup by going to https://myapps.microsoft.com with your admin account and click on the SalesforceCAS app. You should then experience SSO to Salesforce.
!IMAGETest SSO
!IMAGETest SSO
⚠️ If you receive an error message, verify that you validated the SSO configuration by clicking on the Log in button in step 14.
===
The next step of the configuration is to create a Conditional access policy in Azure AD and then complete the configuration in Cloud App Security.
[!HINT] Soon, you will be able to perform the full configuration from the Azure AD conditional access policy configuration pane.
-
[] In Azure Active Directory, under Security, click on Conditional access.
!IMAGEConfigure policy
-
[] Click on New policy and create a new policy.
!IMAGEConfigure policy
-
[] Use the following settings in your policy.
Name: Test Cloud App Security proxy Assignment: choose your admin Cloud apps: SalesforceCAS Access control / Session: Use Conditional Access App Control checkBox
!IMAGEConfigure policy
!IMAGEConfigure policy
!IMAGEConfigure policy
-
[] Enable your policy and click on Create
!IMAGEConfigure policy
!IMAGEConfigure policy
-
[] After the policy was created successfully, open a new browser, make sure you are logged out, go to
https://myapps.microsoft.com
, connect with the admin user and click on the SalesforceCAS tile. -
[] Go back to the Cloud App Security portal, and under the settings cog choose Conditional Access App Control.
!IMAGEConfigure policy
You should see know that Salesforce has been discovered and need to continue the setup.
!IMAGEConfigure policy
[!HINT] If the message does not appear, go back to step 5. (After the policy was created...) this time, close the browser and open a new browser in Incognito mode.
In the dialog that opens, click on Add.
!IMAGEConfigure policy
!IMAGEConfigure policy
The deployment is now complete!
Conditional Access App Control is capable to identify company devices using either Azure AD, Intune or certificates (provided by 3rd party MDM for example). We will here simulate the 3rd party MDM scenario, using client certificates.
-
[] Go to the settings and at the bottom of the page, choose Device identification.
!IMAGEDevice authentication
-
[] Click on the Browse button and upload the CASTestCA.crt certificate from the Client Certificate folder within the Demofiles.zip file you've received as the certificate authority root certificate.
!IMAGEDevice authentication
!IMAGEDevice authentication
!IMAGEDevice authentication
To control our users sessions to Salesforce, we have now to create a policy.
-
[] In the Cloud App Security portal, select Control followed by Policies.
!IMAGESession policy
-
[] In the Policies page, click Create policy and select Session policy.
!IMAGESession policy
-
[] In the Session policy window, assign a name for your policy, such as Block download of sensitive documents to unmanaged devices and in the Session control type field, select Control file download (with DLP)
!IMAGESession policy
-
[] Under Activity source in the Activities matching all of the following section, select the following activity filters to apply to the policy:
Device tags does not equal Valid client certificate App equals Salesforce Check the Enabled checkBox near Content inspection
!IMAGESession policy
-
[] Check the Include files that match a preset expression radio button. In the dropdown menu just below the radio button, scroll all the way to the end to choose US: PII: Social security number and check the Don't require relevant context checkBox, just below the dropdown menu.
!IMAGESession policy
-
[] Under Actions, select Block. Check the Customize block message checkBox, and add a custom message in the textBox that has opened, e.g.: "This file is sensitive"
!IMAGESession policy
-
[] Click on Create
-
[] Create a second Session policy called Protect download to unmanaged devices. In the Session control type field Select Control file download (with DLP).
!IMAGESession policy
-
[] Under Activity source in the Activities matching all of the following section, select the following activity filters to apply to the policy:
Device tags does not equal Valid client certificate App equals Salesforce
!IMAGESession policy
-
[] Check the Enabled checkBox near Content inspection. Under Actions, select Protect
!IMAGESession policy
-
[] Click on Create
-
[] Disable this policy
-
[] Extract the file silvia.pfx from the Client Certificate folder in Demo files.zip file you've received
-
[] Double click on the silvia.pfx file, click Next, Next, enter the password acme, click Next, Next, Finish.
-
[] Open a new browser in an Incognito mode
-
[] Go to https://myapps.microsoft.com and login with the admin user.
-
[] Click on the SalesforceCAS icon.
-
[] You should now see a certificate prompt. Click on Cancel.
[!HINT] This will simulate a connection from an unmannaged device. In a real demo, you can open two different browsers, side by side, and show the user experience from a managed and unmanaged device by clicking on OK in one browser and Cancel in the other.
!IMAGESession policy
-
[] You should then see a Monitored access message, click on Continue to Salesforce to continue.
!IMAGESession policy
-
[] Now you are logged in to Salesforce. Click on + and go to Files
!IMAGEd0ik67yl.jpg
-
[] Upload the files Personal employees information.docx and Protect with Microsoft Cloud App Security proxy.pdf from the Demo files.zip file to the Files page in Salesforce
-
[] Download the Protect with Microsoft Cloud App Security proxy.pdf files and see that it is downloaded, and you can open it.
-
[] Download the Personal employees information.docx file and see that you get a blocking message and instead of the file, you get a Blocked...txt file.
!IMAGEwvk16zl2.jpg
-
[] Go back to the Cloud App Security portal, and under Investigate choose Activity log
-
[] See the login activity that was redirected to the session control, the file download that was not blocked, and the file download that was blocked because it matched the policy.
!IMAGEj0vuo06k.jpg
===