πŸ”’ Guided

Pre-launch preview. Authorised access only.

Incorrect code

Guided by A Guide to Cloud
Explore AB-900 AI-901
Guided SC-900 Domain 3
Domain 3 β€” Module 8 of 9 89%
20 of 28 overall

SC-900 Study Guide

Domain 1: Security, Compliance & Identity Concepts

  • Security Foundations: Shared Responsibility & Defence-in-Depth Free
  • Zero Trust: Never Trust, Always Verify Free
  • Encryption, Hashing & GRC Free
  • Identity: The New Security Perimeter Free

Domain 2: Microsoft Entra Capabilities

  • Microsoft Entra ID: Your Identity Hub Free
  • Hybrid & External Identities
  • Authentication: Passwords, MFA & Passwordless
  • Password Protection & Self-Service Reset
  • Conditional Access: Smart Access Decisions
  • Entra Roles and RBAC
  • Identity Governance: Entitlements and Access Reviews
  • PIM and Identity Protection

Domain 3: Microsoft Security Solutions

  • Azure Network Defence: DDoS, Firewall & WAF
  • Azure Infrastructure Security: VNets, NSGs, Bastion & Key Vault
  • Microsoft Defender for Cloud
  • Microsoft Sentinel: SIEM Meets SOAR
  • Defender XDR: The Unified Threat Platform
  • Microsoft Defender for Office 365
  • Microsoft Defender for Endpoint
  • Defender for Cloud Apps & Defender for Identity
  • Vulnerability Management & Threat Intelligence

Domain 4: Microsoft Compliance Solutions

  • Service Trust Portal, Privacy Principles & Microsoft Priva
  • The Purview Portal & Compliance Manager
  • Data Classification & Sensitivity Labels
  • Data Loss Prevention (DLP)
  • Records Management & Retention
  • Insider Risk Management
  • eDiscovery & Audit

SC-900 Study Guide

Domain 1: Security, Compliance & Identity Concepts

  • Security Foundations: Shared Responsibility & Defence-in-Depth Free
  • Zero Trust: Never Trust, Always Verify Free
  • Encryption, Hashing & GRC Free
  • Identity: The New Security Perimeter Free

Domain 2: Microsoft Entra Capabilities

  • Microsoft Entra ID: Your Identity Hub Free
  • Hybrid & External Identities
  • Authentication: Passwords, MFA & Passwordless
  • Password Protection & Self-Service Reset
  • Conditional Access: Smart Access Decisions
  • Entra Roles and RBAC
  • Identity Governance: Entitlements and Access Reviews
  • PIM and Identity Protection

Domain 3: Microsoft Security Solutions

  • Azure Network Defence: DDoS, Firewall & WAF
  • Azure Infrastructure Security: VNets, NSGs, Bastion & Key Vault
  • Microsoft Defender for Cloud
  • Microsoft Sentinel: SIEM Meets SOAR
  • Defender XDR: The Unified Threat Platform
  • Microsoft Defender for Office 365
  • Microsoft Defender for Endpoint
  • Defender for Cloud Apps & Defender for Identity
  • Vulnerability Management & Threat Intelligence

Domain 4: Microsoft Compliance Solutions

  • Service Trust Portal, Privacy Principles & Microsoft Priva
  • The Purview Portal & Compliance Manager
  • Data Classification & Sensitivity Labels
  • Data Loss Prevention (DLP)
  • Records Management & Retention
  • Insider Risk Management
  • eDiscovery & Audit
Domain 3: Microsoft Security Solutions Premium ⏱ ~11 min read

Defender for Cloud Apps & Defender for Identity

Defender for Cloud Apps is your CASB for SaaS security β€” shadow IT, session controls, and app governance. Defender for Identity protects on-premises Active Directory from lateral movement and credential theft.

Part 1: Microsoft Defender for Cloud Apps

What is it?

β˜• Simple explanation

Think of Defender for Cloud Apps as a security guard for all the cloud services your organisation uses.

Employees use dozens of cloud apps β€” Dropbox, Salesforce, Slack, Google Drive, and many more. Some are approved by IT. Many are not. Defender for Cloud Apps watches all of them.

It’s like having a guard who can see every app employees connect to, flag the risky ones, and even step in during a session to say β€œYou can view that file, but you can’t download it” β€” in real time.

Microsoft Defender for Cloud Apps (formerly Microsoft Cloud App Security / MCAS) is a Cloud Access Security Broker (CASB). A CASB sits between your users and cloud services, providing visibility, control, and threat protection for SaaS applications.

It discovers cloud app usage across the organisation, applies governance policies, controls access in real time, and detects threats targeting cloud-stored data.

Shadow IT discovery

The problem: Employees often use cloud apps that IT doesn’t know about β€” personal Dropbox accounts, random file-sharing sites, unapproved project management tools. This is called shadow IT.

The solution: Defender for Cloud Apps analyses firewall and proxy logs to discover every cloud app in use across the organisation. It then scores each app for risk based on factors like compliance certifications, security controls, and legal terms.

Alex discovered that SecureBank employees were using 147 cloud apps β€” but IT had only approved 23. Twelve of those unapproved apps had high-risk scores.

App governance

Once you know what apps are in use, you can control them:

  • Sanction apps you approve (mark as safe)
  • Unsanction risky apps (block access)
  • Monitor apps that are borderline β€” watch their usage before deciding

App governance also covers OAuth apps β€” third-party apps that employees grant access to their Microsoft 365 data. Defender for Cloud Apps can detect when an app requests excessive permissions.

Session policies and conditional access app control

This is one of the most powerful features:

  • Real-time session monitoring β€” watch what users do inside cloud apps as it happens
  • Conditional access app control β€” enforce rules mid-session. For example:
    • Allow viewing documents in Salesforce but block downloads from unmanaged devices
    • Allow access to SharePoint but add a watermark to downloaded files
    • Block copy/paste of sensitive content from a cloud app

Session policies work with Entra ID Conditional Access to proxy user sessions through Defender for Cloud Apps.

File policies and threat detection

  • File policies: Scan files stored in connected cloud apps for sensitive data (credit card numbers, national ID numbers, health records). Alert or quarantine when found.
  • Anomaly detection: Uses machine learning to detect unusual behaviour β€” like a user suddenly downloading thousands of files, or logging in from an impossible location.
πŸ’‘ Scenario: Alex discovers a rogue app at SecureBank

During a routine shadow IT review, Alex notices a file-sharing app called β€œQuickShare” that 40 employees are using. Defender for Cloud Apps scored it 2/10 for risk:

  • No encryption in transit
  • Hosted in a jurisdiction with weak data protection laws
  • No SOC 2 or ISO 27001 compliance

Alex takes action:

  1. Unsanctions QuickShare β€” Defender blocks access for all users
  2. Creates a policy to detect and block similar high-risk file-sharing apps automatically
  3. Reports to Director Reyes with a dashboard showing all 12 high-risk apps and recommended alternatives

Director Reyes approves a company-wide communication directing employees to use OneDrive instead.


Part 2: Microsoft Defender for Identity

What is it?

β˜• Simple explanation

Think of Defender for Identity as a security camera system for your on-premises Active Directory.

Active Directory (AD) is the system that manages user accounts, passwords, and permissions in traditional corporate networks. Attackers love targeting AD because if they compromise it, they can access everything.

Defender for Identity watches all the activity in AD β€” logins, permission changes, network scans β€” and spots the patterns that indicate an attack is underway. It’s like having cameras that don’t just record, but also recognise suspicious behaviour and alert security.

Microsoft Defender for Identity (formerly Azure Advanced Threat Protection / Azure ATP) is a cloud-based security solution that uses on-premises Active Directory signals to detect identity-based threats, compromised identities, and malicious insider actions.

It deploys sensors on domain controllers that monitor AD traffic in real time, using behavioural analytics and machine learning to identify reconnaissance, lateral movement, and domain dominance attacks.

How it works

Defender for Identity installs lightweight sensors directly on your domain controllers (the servers that run Active Directory). These sensors monitor:

  • Authentication traffic (who’s logging in, from where)
  • Directory queries (who’s looking up user accounts or group memberships)
  • Network activity (unusual scanning or enumeration)

The sensors send data to the Defender for Identity cloud service, which analyses it for threat patterns.

What threats does it detect?

Threat CategoryExampleWhat It Means
ReconnaissanceAn account queries AD for all admin group membersAn attacker is mapping out the network to find high-value targets
Credential theftPass-the-hash or pass-the-ticket attacks detectedAn attacker has stolen credential material and is reusing it
Lateral movementAn account authenticates to 15 servers in 2 minutesAn attacker is hopping between machines looking for valuable data
Domain dominanceA new account is added to Domain AdminsAn attacker has gained the highest level of access in AD
Compromised identityAn account logs in from a location it has never used beforeA user account may be under someone else’s control
πŸ’‘ Scenario: Alex catches lateral movement at SecureBank

Defender for Identity alerts Alex: a service account (svc-backup) just authenticated to 23 servers in under 3 minutes using pass-the-hash.

What Alex sees in the Defender portal:

  • The service account normally only connects to the backup server
  • The authentication pattern matches a known lateral movement technique
  • The timeline shows the account was accessed from a workstation in the lobby β€” not the server room

Alex’s response:

  1. Disables the service account immediately
  2. Checks the lobby workstation β€” finds it was left unlocked
  3. Resets the service account credentials
  4. Creates an alert rule for any service account authenticating to more than 3 servers

Defender for Identity caught this in real time because it learned the normal behaviour pattern of svc-backup and flagged the deviation.

Signals feed into Defender XDR

Defender for Identity doesn’t work alone. Its identity signals are sent to the Defender XDR portal where they’re correlated with:

  • Email threats (Defender for Office 365)
  • Device threats (Defender for Endpoint)
  • Cloud app threats (Defender for Cloud Apps)

If an attacker steals credentials from a device (Endpoint), uses them to move laterally through AD (Identity), and accesses cloud apps (Cloud Apps) β€” XDR connects all three into one incident.


Comparison: Three identity-related security tools

The exam often tests whether you know the difference between these three overlapping tools:

Defender for Cloud Apps vs Defender for Identity vs Entra ID Protection
FeatureWhat It ProtectsWhere It WorksKey Focus
Defender for Cloud AppsSaaS applications (Dropbox, Salesforce, M365 apps)Cloud β€” monitors cloud app sessions and dataShadow IT discovery, session control, app governance, file policies
Defender for IdentityOn-premises Active DirectoryOn-premises β€” sensors on domain controllersLateral movement, credential theft, reconnaissance, domain dominance
Entra ID ProtectionCloud identities in Microsoft Entra IDCloud β€” analyses sign-in signalsRisky sign-ins, risky users, sign-in risk policies, user risk policies

Exam shortcut: If the question mentions SaaS apps or shadow IT = Defender for Cloud Apps. On-premises AD or lateral movement = Defender for Identity. Cloud sign-in risk or risky users = Entra ID Protection.

🎬 Video walkthrough

🎬 Video coming soon

Defender for Cloud Apps and Identity β€” SC-900 Module 8

Defender for Cloud Apps and Identity β€” SC-900 Module 8

~9 min

Flashcards

Question

What is a CASB, and which Microsoft product is a CASB?

Click or press Enter to reveal answer

Answer

A Cloud Access Security Broker (CASB) sits between users and cloud services to provide visibility, control, and threat protection. Microsoft Defender for Cloud Apps is Microsoft's CASB solution.

Click to flip back

Question

What is shadow IT, and how does Defender for Cloud Apps address it?

Click or press Enter to reveal answer

Answer

Shadow IT is the use of cloud apps that IT hasn't approved or doesn't know about. Defender for Cloud Apps discovers all cloud apps by analysing firewall/proxy logs, risk-scores each one, and lets admins sanction (approve) or unsanction (block) them.

Click to flip back

Question

Where does Defender for Identity get its data, and what does it detect?

Click or press Enter to reveal answer

Answer

Defender for Identity installs sensors on on-premises domain controllers. It monitors Active Directory traffic to detect: reconnaissance (network mapping), credential theft (pass-the-hash), lateral movement (hopping between servers), and domain dominance (escalating to admin).

Click to flip back

Question

How do you tell apart Defender for Cloud Apps, Defender for Identity, and Entra ID Protection?

Click or press Enter to reveal answer

Answer

Cloud Apps = SaaS app security (shadow IT, session control). Identity = on-premises AD security (lateral movement, credential theft). Entra ID Protection = cloud identity risk (risky sign-ins, risky users). Cloud Apps watches apps. Identity watches AD. Entra ID Protection watches cloud sign-ins.

Click to flip back

Question

What is conditional access app control in Defender for Cloud Apps?

Click or press Enter to reveal answer

Answer

It proxies user sessions through Defender for Cloud Apps (integrated with Entra Conditional Access) to enforce real-time controls β€” like allowing document viewing but blocking downloads, adding watermarks, or blocking copy/paste of sensitive content.

Click to flip back

Knowledge Check

Knowledge Check

Director Reyes asks Alex to find out what unapproved cloud apps SecureBank employees are using. She wants to block any high-risk file-sharing apps immediately. Which product and features should Alex use?

Knowledge Check

A service account that normally connects only to the backup server suddenly authenticates to 30 different servers using pass-the-hash in under 5 minutes. Which Defender product detects this threat?

Knowledge Check

SecureBank wants to allow employees to view documents in Salesforce from unmanaged personal devices but prevent them from downloading those documents. Which feature enables this?


Next up: Defender Vulnerability Management and Defender Threat Intelligence β€” understanding what’s wrong inside your environment and what threats are coming from outside.

← Previous

Microsoft Defender for Endpoint

Next β†’

Vulnerability Management & Threat Intelligence

Guided

I learn, I simplify, I share.

A Guide to Cloud YouTube Feedback

© 2026 Sutheesh. All rights reserved.

Guided is an independent study resource and is not affiliated with, endorsed by, or officially connected to Microsoft. Microsoft, Azure, and related trademarks are property of Microsoft Corporation. Always verify information against Microsoft Learn.