

- Cloudapp security portal install#
- Cloudapp security portal registration#
- Cloudapp security portal password#
Click Add SIEM agent to start the wizard.In the Office 365 Cloud App Security portal, select Settings > SIEM agents.To configure Office 365 Cloud App Security to send CEF-formatted alerts to USM Appliance
Cloudapp security portal install#
Since unauthorized modification of USM Appliance can lead to instability, you must install the SIEM Agent on a different machine (nicknamed Syslog Forwarder below) and then forward the syslog messages to USM Appliance.īefore you configure the Microsoft Office 365 Cloud App Security integration, you must have the IP address of the Syslog Forwarder and the USM Appliance Sensor. For instance, we can define a file policy where we match files or data in Service Now according to defined sensitivity labels in Microsoft 365 and integrate that with ServiceNow.According to the Microsoft documentation, the integration of Office 365 Cloud App Security with a SIEM server requires downloading a SIEM Agent (JAR file) and running it on the server. You can also use MCAS in combination with File Policies as well. This opens another complete set of features as well and shows how we can use Service Now in combination with MCAS. It should be noted that this would require that the service now instance is federated with Azure Active Directory to have any effect.Īnother cool feature with MCAS now is that we can send alerts to Power Automate as well. Then we can define an action such as suspending a user. Here we define an activity policy and scope it to the App Service Now. So, what can we do with this? One example is suspending a user when someone is trying to logon to Service Now multiple attempts. Marking a user, you can show all user-related activity. Users from Service Now will be marked with the logo behind them. When going into Investigate –> Users and Accounts you can after a while see users get listed within the portal. NB: For some reason, the connector also gets all system-based activity which might flood your activity log within Cloud App Security. If you go into the application overview it will see user activity for the users If the connection is successful, it will take some time before the activities and user information gets populated into Cloud App Security. Then go into Cloud App Security Portal –> Investigate –> Connected Apps and select Connect an App
Cloudapp security portal password#
If you use the username and password approach the credentials are only used for API token generation and are not saved after the initial connection process.
Cloudapp security portal registration#
You can use either an OAuth application registration or a username or password

– Require user to sign in again (via Azure AD) In addition to monitoring for potential threats, you can apply and automate the following ServiceNow governance actions to remediate detected threats: User governance Unusual multiple file download activitiesĭetect a file shared with an unauthorized domainĭetect a file shared with personal email addresses Activity performed by terminated user (requires AAD as IdP)
