🔒 Guided

Pre-launch preview. Authorised access only.

Incorrect code

Guided by A Guide to Cloud
Explore AB-900 AI-901
Guided SC-300 Domain 3
Domain 3 — Module 5 of 6 83%
20 of 27 overall

SC-300 Study Guide

Domain 1: Implement and Manage User Identities

  • Your Entra Tenant: Branding, Settings & Domains
  • Entra Roles & Administrative Units
  • Managing Users & Groups
  • Device Registration & Licensing
  • External Identities: Guest Access & B2B
  • Cross-Tenant Access & Synchronisation
  • Hybrid Identity: Connect Sync vs Cloud Sync
  • Hybrid Authentication: PHS, PTA & Seamless SSO

Domain 2: Implement Authentication and Access Management

  • Authentication Methods: Plan & Implement
  • Passwordless & Windows Hello for Business
  • MFA, SSPR & Password Protection
  • Conditional Access: Plan & Build Policies
  • Conditional Access: Advanced Controls & Troubleshooting
  • Entra ID Protection: Risk-Based Security
  • Global Secure Access: Zero Trust Networking

Domain 3: Plan and Implement Workload Identities

  • Workload Identities: Managed Identities & Service Principals
  • Enterprise Apps: SSO, App Proxy & Integration
  • Enterprise Apps: Users, Consent & Collections
  • App Registrations: Build & Secure
  • Defender for Cloud Apps: Discover & Control
  • Defender for Cloud Apps: Policies & OAuth Governance

Domain 4: Plan and Automate Identity Governance

  • Entitlement Management: Catalogs & Access Packages Free
  • Access Requests, Terms of Use & External Lifecycle Free
  • Access Reviews: Plan, Create & Monitor Free
  • PIM: Protect Your Privileged Roles Free
  • PIM: Azure Resources, Groups & Audit Free
  • Identity Monitoring: Logs, KQL & Secure Score Free

SC-300 Study Guide

Domain 1: Implement and Manage User Identities

  • Your Entra Tenant: Branding, Settings & Domains
  • Entra Roles & Administrative Units
  • Managing Users & Groups
  • Device Registration & Licensing
  • External Identities: Guest Access & B2B
  • Cross-Tenant Access & Synchronisation
  • Hybrid Identity: Connect Sync vs Cloud Sync
  • Hybrid Authentication: PHS, PTA & Seamless SSO

Domain 2: Implement Authentication and Access Management

  • Authentication Methods: Plan & Implement
  • Passwordless & Windows Hello for Business
  • MFA, SSPR & Password Protection
  • Conditional Access: Plan & Build Policies
  • Conditional Access: Advanced Controls & Troubleshooting
  • Entra ID Protection: Risk-Based Security
  • Global Secure Access: Zero Trust Networking

Domain 3: Plan and Implement Workload Identities

  • Workload Identities: Managed Identities & Service Principals
  • Enterprise Apps: SSO, App Proxy & Integration
  • Enterprise Apps: Users, Consent & Collections
  • App Registrations: Build & Secure
  • Defender for Cloud Apps: Discover & Control
  • Defender for Cloud Apps: Policies & OAuth Governance

Domain 4: Plan and Automate Identity Governance

  • Entitlement Management: Catalogs & Access Packages Free
  • Access Requests, Terms of Use & External Lifecycle Free
  • Access Reviews: Plan, Create & Monitor Free
  • PIM: Protect Your Privileged Roles Free
  • PIM: Azure Resources, Groups & Audit Free
  • Identity Monitoring: Logs, KQL & Secure Score Free
Domain 3: Plan and Implement Workload Identities Premium ⏱ ~13 min read

Defender for Cloud Apps: Discover & Control

Discover shadow IT with Cloud Discovery, connect and monitor sanctioned apps, and implement Conditional Access App Control for real-time session governance.

What is Microsoft Defender for Cloud Apps?

☕ Simple explanation

Defender for Cloud Apps is like a security camera system for all the cloud apps your company uses.

Imagine you run a building. You know about the main doors (sanctioned apps like Teams and SharePoint). But employees are also climbing through windows (shadow IT — unapproved apps). Some visitors are sneaking into restricted rooms (risky data access).

Defender for Cloud Apps does three things: (1) discovers every door and window being used (Cloud Discovery), (2) connects security cameras to the main doors so you can see what’s happening inside (Connected Apps), and (3) lets you set rules like “visitors can look but not take photos” (session policies).

Microsoft Defender for Cloud Apps (formerly Microsoft Cloud App Security / MCAS) is a Cloud Access Security Broker (CASB) that provides visibility, data control, and threat protection across cloud services. It sits between your users and their cloud apps, acting as a gatekeeper.

Core capabilities: Cloud Discovery (identify all cloud apps in use), Information Protection (DLP policies for cloud data), Threat Detection (anomaly detection, compromised account alerts), and Conditional Access App Control (real-time session monitoring and restriction via a reverse proxy).

It integrates deeply with Microsoft Entra ID, Microsoft Defender XDR, Microsoft Purview, and Conditional Access policies.

Cloud Discovery — finding shadow IT

Cloud Discovery analyses network traffic logs to identify every cloud app your organisation uses — not just the ones IT knows about.

How Cloud Discovery works

Discovery MethodHow It WorksBest For
Log collectorUpload firewall/proxy logs (Palo Alto, Zscaler, Squid, etc.) manually or automaticallyOrganisations with on-premises network infrastructure
Defender for Endpoint integrationAgents on devices report cloud app traffic directlyModern endpoint-managed environments (no proxy needed)
Secure Web GatewayZscaler or other SWG forwards logs directlyOrganisations using cloud-based web gateways

The Cloud Discovery dashboard

After data flows in, the dashboard shows:

  • Total apps discovered — typically hundreds or thousands (most organisations are shocked)
  • Risk score per app — 1 (highest risk) to 10 (lowest risk) based on 90+ risk factors
  • Categories — collaboration, storage, CRM, development, etc.
  • Users and traffic — who’s using which app, how much data is flowing
  • Sanctioned vs unsanctioned — apps you’ve approved vs apps you haven’t

Sanctioned and unsanctioned apps

StatusMeaningAction
SanctionedApproved by IT — safe to useApp is tagged as approved. Used as a signal in policies.
UnsanctionedNot approved — blocked or flaggedCan generate block scripts for firewalls/proxies. Users see a warning page.
MonitoredUnder review — neither approved nor blockedIT is evaluating the app before making a decision.
ℹ️ Scenario: Anika discovers shadow IT

🛡️ Anika Weber at Sentinel Partners runs a Cloud Discovery analysis for a new banking client. She integrates Defender for Endpoint (already deployed on all devices) with Defender for Cloud Apps.

Discoveries after 7 days:

  • 847 cloud apps detected (the client expected about 30)
  • 3 file-sharing apps with risk score 2 (no encryption, servers in non-compliant jurisdictions) being used by the finance team
  • 12 AI tools (ChatGPT, Midjourney, etc.) with data being uploaded by developers
  • 1 CRM app scoring 8/10 but not on the approved vendor list

Anika’s actions:

  1. Unsanctions the 3 risky file-sharing apps → generates firewall block scripts
  2. Tags the AI tools as monitored → starts a policy review with the CISO
  3. Sanctions the CRM app after verifying it meets compliance requirements
  4. Presents a risk report to the client’s board showing data exposure through unapproved apps

Result: The client goes from blind to fully informed in one week. Shadow IT is no longer invisible.

Connected apps — deep visibility

Connected apps give Defender for Cloud Apps API-level access to sanctioned cloud services, enabling:

  • User activity monitoring (who accessed what, when)
  • File scanning (DLP — detect sensitive data in cloud storage)
  • Anomaly detection (impossible travel, mass downloads)
  • Governance actions (quarantine files, suspend accounts)

App connectors

ConnectorWhat It Monitors
Microsoft 365Exchange, SharePoint, OneDrive, Teams activity
AzureAzure resource management, sign-in activity
SalesforceUser activity, file sharing, admin changes
Google WorkspaceDrive, Gmail, Admin console activity
DropboxFile sharing, user activity
Box, ServiceNow, Okta, GitHub, etc.Service-specific activities

Connecting an app:

  1. Defender for Cloud Apps portal → Settings → Connected apps → App connectors
  2. Click Connect an app → select the app
  3. Follow the wizard (typically involves authorising the connector with an admin account in the target app)
  4. Once connected, data starts flowing within minutes to hours
💡 Exam tip: Connector permissions

Connecting an app requires admin credentials in the target app (e.g., a Salesforce admin account). The connector uses the target app’s API to pull activity logs and file metadata. For Microsoft 365, the connection is automatic when Defender for Cloud Apps is part of your Microsoft 365 E5 or EMS E5 licence.

Application-enforced restrictions

Application-enforced restrictions use Entra ID Conditional Access to signal to apps (primarily SharePoint Online and Exchange Online) that a session is restricted. The app itself enforces the restriction.

How it works:

  1. A Conditional Access policy targets SharePoint Online or Exchange Online
  2. The policy grants access with the session control: “Use app enforced restrictions”
  3. When a user signs in from a non-compliant device, Entra ID sends a claim to the app
  4. SharePoint/Exchange reads the claim and limits functionality (e.g., read-only, no downloads)

Example restrictions in SharePoint Online:

  • Full access: compliant device → normal experience
  • Limited web-only access: unmanaged device → can view but not download, sync, or print
  • Block access: blocked by policy → access denied
💡 Exam tip: App-enforced vs CA App Control

Don’t confuse these two:

  • Application-enforced restrictions: The app (SharePoint/Exchange) enforces limits. Works only for these Microsoft apps. Simple to configure. Limited to the restrictions the app supports.
  • Conditional Access App Control: Defender for Cloud Apps acts as a reverse proxy. Works for any supported app. More granular — can block copy/paste, watermark downloads, block specific file types.

Conditional Access App Control — real-time session governance

Conditional Access App Control routes user sessions through a reverse proxy (Defender for Cloud Apps), enabling real-time monitoring and control.

Architecture

User signs in via Entra ID
    ↓ Conditional Access policy applies "Use Conditional Access App Control"
Session is routed through Defender for Cloud Apps reverse proxy
    ↓ URL changes to *.mcas.ms (e.g., app.contoso.com → app.contoso.com.mcas.ms)
Defender for Cloud Apps inspects every action in real time
    ↓ Applies access and session policies
Traffic is forwarded to the actual app

Setting it up

  1. Create a Conditional Access policy in Entra ID:

    • Target the app(s) you want to protect
    • Under Session controls → select “Use Conditional Access App Control”
    • Choose “Monitor only” (for testing) or “Use custom policy” (for enforcement)
  2. Sign in to the app as a user covered by the policy — this onboards the app to Defender for Cloud Apps automatically (for gallery apps)

  3. Create access or session policies in Defender for Cloud Apps (covered in the next module)

Supported apps

App TypeOnboarding
Featured Microsoft apps (SharePoint, Exchange, Teams, etc.)Automatic — just create the CA policy
Featured third-party apps (Salesforce, Box, Dropbox, etc.)Automatic — sign in after CA policy creation
Custom/non-gallery appsManual onboarding — add the app in Defender for Cloud Apps settings
ℹ️ Scenario: Priya implements CA App Control for SharePoint

🔐 Priya Sharma at Meridian Health wants to prevent clinicians from downloading patient files when using personal devices:

  1. Conditional Access policy:

    • Users: All clinical staff
    • Cloud apps: SharePoint Online
    • Conditions: Device state = unmanaged (not compliant, not hybrid joined)
    • Session: Use Conditional Access App Control → Use custom policy
  2. Session policy in Defender for Cloud Apps:

    • Activity type: Download file
    • Filter: Files labelled “Confidential” or “Patient Data”
    • Action: Block

Result: Clinicians on personal devices can view patient files in the browser but cannot download them. On managed hospital devices, downloads work normally. Every blocked attempt is logged for audit.

🎬 Video walkthrough

🎬 Video coming soon

Defender for Cloud Apps Discovery & Control — SC-300 Module 20

Defender for Cloud Apps Discovery & Control — SC-300 Module 20

~12 min

Flashcards

Question

What is Cloud Discovery in Defender for Cloud Apps?

Click or press Enter to reveal answer

Answer

Cloud Discovery analyses network traffic (from firewall logs, Defender for Endpoint, or secure web gateways) to identify all cloud apps being used in the organisation — including shadow IT. It assigns risk scores and lets admins sanction or unsanction apps.

Click to flip back

Question

What is the difference between app-enforced restrictions and Conditional Access App Control?

Click or press Enter to reveal answer

Answer

App-enforced restrictions: the app itself (SharePoint/Exchange) enforces limits based on a Conditional Access signal. Only works for select Microsoft apps. CA App Control: Defender for Cloud Apps acts as a reverse proxy, inspecting every action in real time. Works for many apps with more granular controls (block downloads, watermark, block paste).

Click to flip back

Question

What is a connected app in Defender for Cloud Apps?

Click or press Enter to reveal answer

Answer

A cloud app connected via API to Defender for Cloud Apps, providing deep visibility into user activity, file content, anomaly detection, and governance actions. Connectors exist for Microsoft 365, Azure, Salesforce, Google Workspace, Dropbox, Box, and more.

Click to flip back

Question

How does Conditional Access App Control route traffic?

Click or press Enter to reveal answer

Answer

After a Conditional Access policy triggers CA App Control, the user's session is redirected through the Defender for Cloud Apps reverse proxy. URLs change to the *.mcas.ms domain. The proxy inspects every request in real time and applies access/session policies before forwarding traffic to the actual app.

Click to flip back

Knowledge Check

Knowledge Check

Anika's client wants to identify all cloud apps being used across the organisation without installing any new infrastructure. The client already has Defender for Endpoint on all devices. What should Anika configure?

Knowledge Check

Priya wants clinicians on unmanaged devices to view SharePoint files but not download them. She doesn't need advanced controls — just block downloads. What's the simplest approach?

Knowledge Check

After enabling Conditional Access App Control for Salesforce, Anika notices the URL changes to salesforce.com.mcas.ms when users access the app. A user reports that a custom Salesforce plugin no longer works. What is the most likely cause?


Next up: Defender for Cloud Apps: Policies & OAuth Governance — how to create access and session policies, manage OAuth app risks, and use the cloud app catalog for governance.

← Previous

App Registrations: Build & Secure

Next →

Defender for Cloud Apps: Policies & OAuth Governance

Guided

I learn, I simplify, I share.

A Guide to Cloud YouTube Feedback

© 2026 Sutheesh. All rights reserved.

Guided is an independent study resource and is not affiliated with, endorsed by, or officially connected to Microsoft. Microsoft, Azure, and related trademarks are property of Microsoft Corporation. Always verify information against Microsoft Learn.