From the course: Microsoft 365: Implement Security and Threat Management
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Cloud App Security and traffic logs
From the course: Microsoft 365: Implement Security and Threat Management
Cloud App Security and traffic logs
- Cloud App Security and Traffic Logs. Cloud discovery uses the data in your traffic logs. The more detailed your log, the better visibility you get. Cloud discovery requires web traffic data with the following attributes, date of the transaction, source IP, source user, which is highly recommended, destination IP address, destination URL, which is also recommended, amount of uploaded or downloaded data, total amount of data and action taken. Cloud discovery can't show or analyze attributes that aren't included in the logs. For example, a Cisco ASA firewall, standard log format, doesn't have the number of uploaded bytes per transaction, username and target URL. Therefore, these attributes will not be shown in the cloud discovery data for these logs. Log collectors enable you to easily automate the log upload from your network. The log collector runs on your network and receives logs over syslog or FTP. Each log is then…
Contents
-
-
-
Plan for Cloud App Security6m 53s
-
(Locked)
Configure Cloud App Security8m 21s
-
(Locked)
Create Cloud App Security policies6m 48s
-
(Locked)
Configure connected apps4m 51s
-
(Locked)
Design a Cloud App Security solution5m 12s
-
(Locked)
Cloud App Security alerts6m 51s
-
(Locked)
Configure Cloud App Security alerts7m 23s
-
(Locked)
Cloud App Security and traffic logs6m 34s
-
Use traffic logs in Cloud App Security6m 16s
-
-
-
-
-