🔒 Guided

Pre-launch preview. Authorised access only.

Incorrect code

Guided by A Guide to Cloud
Explore AB-900 AI-901
Guided MS-102 Domain 3
Domain 3 — Module 8 of 8 100%
23 of 28 overall

MS-102 Study Guide

Domain 1: Deploy and Manage a Microsoft 365 Tenant

  • Establish and Configure Your M365 Tenant
  • Monitor Tenant Health and Network Readiness
  • Adoption Tracking and Microsoft 365 Backup
  • Manage Users, Contacts and External Identities
  • Groups, Shared Mailboxes and Licensing at Scale
  • Automate with PowerShell: Bulk User Operations
  • Roles, Role Groups and Workload Permissions
  • Delegate with Administrative Units and PIM

Domain 2: Implement and Manage Microsoft Entra Identity and Access

  • Prepare for Identity Synchronization
  • Implement Connect Sync and Cloud Sync
  • Monitor and Troubleshoot Identity Sync
  • Authentication Methods and Self-Service Password Reset
  • Password Protection and Authentication Troubleshooting
  • Entra Identity Protection and Risk Policies
  • Conditional Access and MFA Enforcement

Domain 3: Manage Security and Threats by Using Microsoft Defender XDR

  • Defender XDR: Security Posture and Threat Intelligence
  • Investigate Incidents with Advanced Hunting
  • Defender for Office 365: Threat Policies
  • Email Threats, Attack Simulation and Restricted Entities
  • Defender for Endpoint: Onboard and Protect
  • Vulnerability Management
  • Defender for Cloud Apps: Connect and Govern
  • Cloud App Discovery and Activity Monitoring

Domain 4: Manage Compliance by Using Microsoft Purview

  • Sensitive Information Types and Data Classification
  • Retention Labels and Data Lifecycle
  • Sensitivity Labels and Monitoring
  • DLP Policies Across M365 Workloads
  • Endpoint DLP and Alert Response

MS-102 Study Guide

Domain 1: Deploy and Manage a Microsoft 365 Tenant

  • Establish and Configure Your M365 Tenant
  • Monitor Tenant Health and Network Readiness
  • Adoption Tracking and Microsoft 365 Backup
  • Manage Users, Contacts and External Identities
  • Groups, Shared Mailboxes and Licensing at Scale
  • Automate with PowerShell: Bulk User Operations
  • Roles, Role Groups and Workload Permissions
  • Delegate with Administrative Units and PIM

Domain 2: Implement and Manage Microsoft Entra Identity and Access

  • Prepare for Identity Synchronization
  • Implement Connect Sync and Cloud Sync
  • Monitor and Troubleshoot Identity Sync
  • Authentication Methods and Self-Service Password Reset
  • Password Protection and Authentication Troubleshooting
  • Entra Identity Protection and Risk Policies
  • Conditional Access and MFA Enforcement

Domain 3: Manage Security and Threats by Using Microsoft Defender XDR

  • Defender XDR: Security Posture and Threat Intelligence
  • Investigate Incidents with Advanced Hunting
  • Defender for Office 365: Threat Policies
  • Email Threats, Attack Simulation and Restricted Entities
  • Defender for Endpoint: Onboard and Protect
  • Vulnerability Management
  • Defender for Cloud Apps: Connect and Govern
  • Cloud App Discovery and Activity Monitoring

Domain 4: Manage Compliance by Using Microsoft Purview

  • Sensitive Information Types and Data Classification
  • Retention Labels and Data Lifecycle
  • Sensitivity Labels and Monitoring
  • DLP Policies Across M365 Workloads
  • Endpoint DLP and Alert Response
Domain 3: Manage Security and Threats by Using Microsoft Defender XDR Premium ⏱ ~14 min read

Cloud App Discovery and Activity Monitoring

Discover unsanctioned cloud apps across your organization, interpret the activity log, and respond to risky app usage patterns.

Shining a light on shadow IT

☕ Simple explanation

Cloud App Discovery is a full audit of every cloud service your employees actually use — not just the ones you approved.

Here’s the reality: your company might officially use Microsoft 365 and Salesforce. But your marketing team is using Canva. Finance is using a free invoice tool. Engineering is sharing code on a platform you’ve never heard of. A departing employee is syncing files to a personal cloud storage account. None of these show up in your IT asset list.

Cloud App Discovery analyses your network traffic (or device telemetry from Defender for Endpoint) and builds a complete picture of every cloud service being accessed. It doesn’t just list them — it scores each app for risk, tells you how many users are on it, how much data is flowing to it, and whether it meets your compliance requirements.

Cloud App Discovery is the discovery and assessment engine within Defender for Cloud Apps. It identifies all cloud applications accessed by your users, regardless of whether the app is sanctioned, and provides a risk assessment for each one.

Two discovery methods:

  • Log collector integration — upload firewall and proxy logs (Palo Alto, Zscaler, Check Point, Squid, etc.) to Defender for Cloud Apps for analysis. Can be automated via syslog forwarding or Docker-based log collectors.
  • Defender for Endpoint integration — the MDE sensor on onboarded devices reports all cloud app connections directly. No firewall logs needed. Provides per-device and per-user attribution without network infrastructure changes.

The Defender for Endpoint integration is the preferred method for organizations with MDE deployed. It provides device-level granularity that firewall logs cannot match — you see exactly which user on which device accessed which app, not just that “someone on the corporate network” connected to a URL.

How Cloud App Discovery discovers apps

Method 1: Log collector (firewall and proxy logs)

The traditional approach — export traffic logs from your network appliances and feed them to Defender for Cloud Apps.

StepDetail
1. Deploy log collectorDocker container or virtual appliance in your network that receives syslog from firewalls/proxies
2. Configure data sourcesSelect your firewall vendor format (Palo Alto, Fortinet, Zscaler, etc.)
3. Forward logsPoint firewall syslog output to the log collector’s IP address
4. Automatic parsingDefender for Cloud Apps parses the logs, extracts cloud app URLs, and matches them to the app catalog
5. Continuous analysisNew logs are processed automatically — discovery stays current

Limitation: log-based discovery only sees traffic that passes through the firewall. Remote workers on personal networks, split-tunnel VPN traffic, and direct internet access bypass your firewall — those apps are invisible.

Method 2: Defender for Endpoint integration

The modern approach — and the one the exam favors. MDE-based discovery uses endpoint telemetry instead of network logs.

AdvantageWhy it matters
Per-device attributionSee which specific device accessed each app — not just an IP address
Works anywhereDiscovers apps even when users are remote, off-VPN, or on personal networks
No infrastructure changesNo log collector deployment, no syslog configuration, no firewall reconfiguration
Real-timeDiscovery is continuous — no batch log uploads
Enables app blockingCan block access to unsanctioned apps directly on the endpoint via network protection
FeatureLog CollectorMDE Integration
Data sourceFirewall/proxy traffic logsEndpoint sensor telemetry
Deployment effortDocker container + syslog configNo additional deployment (uses existing MDE sensor)
Remote worker visibilityOnly if traffic routes through corporate firewallFull visibility regardless of network location
Device-level attributionNoYes
App blocking capabilityNoYes
Best forOrganizations without MDE or with unmanaged devicesOrganizations with MDE deployed across their fleet
ℹ️ Dev's discovery approach for client audits

Dev Patel uses a two-phase approach when auditing new clients:

Phase 1 — Quick discovery (week 1): Enable MDE integration for Cloud App Discovery on existing onboarded devices. This gives immediate visibility into cloud app usage without any infrastructure changes. Dev typically discovers 200-400 cloud apps at enterprise clients within the first 48 hours.

Phase 2 — Full coverage (weeks 2-4): Deploy log collectors on perimeter firewalls to capture traffic from unmanaged devices (printers, IoT, guest networks) that MDE doesn’t cover. Cross-reference both data sources for a complete picture.

Dev’s experience: the MDE integration alone captures 85-90% of cloud app usage in most organizations. Log collectors fill the remaining gaps from non-MDE-managed devices.

The Cloud App Catalog — risk-scoring every app

When Cloud App Discovery identifies an app, it matches the app against the Cloud App Catalog — a database of over 31,000 cloud applications, each scored across 90+ risk factors.

Risk score components

Each app receives a score from 1 to 10 (10 being lowest risk):

CategoryWhat it evaluates
GeneralCompany age, domain registration, headquarters location
SecurityEncryption at rest, encryption in transit, MFA support, audit logging, SOC 2 certification
ComplianceGDPR, HIPAA, ISO 27001, SOC 1/2/3, FedRAMP, CSA STAR certifications
LegalData ownership clauses, data retention policies, DMCA compliance

Sanctioning apps

After reviewing discovery results, you classify apps:

  • Sanctioned — approved for use. No restrictions applied. Marked with a green checkmark in discovery reports.
  • Unsanctioned — not approved. Can be blocked at the endpoint via MDE network protection or tagged for follow-up. Marked as blocked in the catalog.
  • Monitored — under review. Not blocked but flagged for increased scrutiny. Useful during evaluation periods.
💡 Exam tip: Blocking unsanctioned apps

The exam tests how unsanctioned apps are blocked. Two enforcement mechanisms:

  • Defender for Endpoint network protection — when you mark an app as Unsanctioned in the Cloud App Catalog, MDE can block access to that app’s domains directly on the endpoint. Requires MDE onboarding and network protection enabled. Works regardless of user location.
  • Firewall/proxy block lists — export the unsanctioned app domain list and add it to your firewall rules. Manual process, only blocks traffic through the firewall.

MDE-based blocking is the preferred method — it works for remote users, doesn’t require firewall changes, and enforces automatically when you update the app status in the catalog.

The activity log — your investigation command center

The activity log is the central timeline of all user and admin actions detected across connected apps. Every sign-in, file download, sharing change, and admin action appears here.

Reading the activity log

Each log entry contains:

FieldDescription
TimestampWhen the activity occurred (UTC)
UserThe user who performed the action
AppWhich connected cloud app (M365, Salesforce, Box, etc.)
Activity typeThe specific action (sign-in, download, share, delete, permission change)
IP addressSource IP of the activity
LocationGeolocation derived from the IP address
DeviceDevice information when available (from MDE integration)

Filtering and investigation

The activity log supports advanced filtering to narrow down investigations:

  • User — filter to a specific user’s activities across all connected apps
  • IP address — find all activities from a suspicious IP
  • Activity type — isolate specific action types (e.g., all file downloads in the last 24 hours)
  • App — focus on a single connected application
  • Date range — narrow the time window for investigation
  • Location — filter by country or city

Dev uses the activity log during incident investigations to build a timeline: “Show me everything this user did across all connected apps in the 48 hours before the incident.”

Exporting activity data

Activity log data can be exported to CSV for offline analysis, compliance documentation, or integration with SIEM platforms. Maximum export: 5,000 activities per query. For larger datasets, use the Defender for Cloud Apps API.

Responding to discovered risks

Discovery is only valuable if you act on what you find. Here’s the response playbook:

Immediate actions for high-risk findings

FindingResponse
High-risk app with many usersUnsanction the app, block via MDE, communicate approved alternatives to users
Data exfiltration patternInvestigate the activity log, identify affected files and users, apply governance actions
Unauthorized file storage appsBlock the app, create a file policy to detect future uploads, review what data was stored
Apps failing compliance requirementsUnsanction if compliance is mandatory (HIPAA, GDPR), document risk if exception is needed

Long-term governance

  • Create activity policies to alert on future usage of newly discovered risky apps
  • Establish an app request process — give users a way to request new apps through IT rather than adopting shadow IT
  • Regular discovery reviews — schedule monthly reviews of new apps appearing in the discovery dashboard
  • Integrate with Conditional Access — route sessions for monitored apps through CAAC for real-time control
ℹ️ Dev audits a client's SaaS landscape

Dev runs a Cloud App Discovery audit for a 5,000-user manufacturing client. Results after two weeks of data collection:

  • 347 cloud apps discovered (the client believed they used about 40)
  • 28 apps scored below 4 out of 10 (high risk — no encryption, no compliance certifications, hosted in jurisdictions with no data protection laws)
  • 3 file storage apps being used as alternatives to OneDrive — employees found them “easier to share with external partners”
  • 1 HR tool storing employee data including national ID numbers — the vendor had no SOC 2 certification and no data processing agreement

Dev’s recommendations: immediately block the 12 highest-risk apps via MDE, work with department heads to migrate users from the 3 file storage apps to OneDrive with external sharing configured properly, and engage legal to review the HR tool’s data handling practices. The remaining low-risk apps were monitored for 90 days before a sanction/unsanction decision.

Question

What are the two methods for Cloud App Discovery and which does the exam prefer?

Click or press Enter to reveal answer

Answer

1) Log collector integration — uploads firewall/proxy logs for analysis. Limited to traffic through corporate network. 2) Defender for Endpoint integration — uses MDE sensor telemetry from onboarded devices. Works anywhere, provides device-level attribution, and enables app blocking. The exam favors the MDE integration method because it provides broader coverage without infrastructure changes.

Click to flip back

Question

What happens when you mark a cloud app as Unsanctioned in the Cloud App Catalog?

Click or press Enter to reveal answer

Answer

If Defender for Endpoint integration is enabled with network protection, MDE blocks access to the unsanctioned app's domains directly on onboarded endpoints — regardless of user location or network. The app appears as blocked in discovery reports. Users attempting to access the app receive a block notification. This enforcement requires MDE onboarding and network protection to be enabled.

Click to flip back

Question

What is the Cloud App Catalog risk score based on?

Click or press Enter to reveal answer

Answer

Each app is scored 1-10 (10 = lowest risk) across 90+ factors in four categories: General (company maturity, domain age), Security (encryption, MFA support, audit logging, SOC 2), Compliance (GDPR, HIPAA, ISO 27001 certifications), and Legal (data ownership, retention policies). The catalog covers over 31,000 cloud applications.

Click to flip back

Question

How do you investigate a suspicious user's activity across all connected cloud apps?

Click or press Enter to reveal answer

Answer

Use the activity log in Defender for Cloud Apps. Filter by the user's identity to see a unified timeline of all their actions across every connected app — sign-ins, file downloads, sharing changes, permission modifications, and admin actions. Filter by date range to focus the investigation window. Export to CSV for documentation or SIEM integration.

Click to flip back

Knowledge check

Knowledge Check

Dev enables Defender for Endpoint integration for Cloud App Discovery at a client site. After 48 hours, the dashboard shows 280 cloud apps discovered. However, the client's firewall team reports they see traffic to approximately 50 additional cloud services from network segments that contain printers, conference room systems, and IoT devices. Why are these 50 apps missing from discovery?

Knowledge Check

Priya reviews the Cloud App Discovery dashboard at GlobalReach and finds that 400 employees are using a file-sharing app called 'QuickDrop' with a risk score of 2 out of 10. The app has no encryption at rest, no SOC 2 certification, and is hosted in a jurisdiction with no data protection laws. What is the correct sequence of actions?

Knowledge Check

Elena is reviewing the activity log in Defender for Cloud Apps after receiving an alert about a MedGuard Health nurse downloading 200 patient files from SharePoint in 15 minutes. She filters the activity log by user and sees the following timeline: 08:00 sign-in from hospital IP, 08:05 normal file access, 09:30 sign-in from unknown IP in another country, 09:32 mass file download begins. What should Elena conclude?

🎬 Video coming soon


Domain 3 nearing completion! Next up: Domain 4 — Sensitive Information Types — begin building your data protection strategy with Microsoft Purview.

← Previous

Defender for Cloud Apps: Connect and Govern

Next →

Sensitive Information Types and Data Classification

Guided

I learn, I simplify, I share.

A Guide to Cloud YouTube Feedback

© 2026 Sutheesh. All rights reserved.

Guided is an independent study resource and is not affiliated with, endorsed by, or officially connected to Microsoft. Microsoft, Azure, and related trademarks are property of Microsoft Corporation. Always verify information against Microsoft Learn.