From the course: Microsoft 365: Implement Security and Threat Management

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Cloud App Security and traffic logs

Cloud App Security and traffic logs

From the course: Microsoft 365: Implement Security and Threat Management

Start my 1-month free trial

Cloud App Security and traffic logs

- Cloud App Security and Traffic Logs. Cloud discovery uses the data in your traffic logs. The more detailed your log, the better visibility you get. Cloud discovery requires web traffic data with the following attributes, date of the transaction, source IP, source user, which is highly recommended, destination IP address, destination URL, which is also recommended, amount of uploaded or downloaded data, total amount of data and action taken. Cloud discovery can't show or analyze attributes that aren't included in the logs. For example, a Cisco ASA firewall, standard log format, doesn't have the number of uploaded bytes per transaction, username and target URL. Therefore, these attributes will not be shown in the cloud discovery data for these logs. Log collectors enable you to easily automate the log upload from your network. The log collector runs on your network and receives logs over syslog or FTP. Each log is then…

Contents