
#INCONTROL APPS LIST DOWNLOAD#
For example, require multi-factor authentication on download of a highly confidential file. Require authentication context: You can reevaluate Azure AD Conditional Access policies when a sensitive action occurs in the session. Prevent data exfiltration: You can block the download, cut, copy, and print of sensitive documents on, for example, unmanaged devices. With the access and session policies, you can: Access and session policies are used within the Defender for Cloud Apps portal to further refine filters and set actions to be taken on a user. After you've determined the conditions, you can route users to Defender for Cloud Apps where you can protect data with Conditional Access App Control by applying access and session controls.Ĭonditional Access App Control enables user app access and sessions to be monitored and controlled in real time based on access and session policies. The conditions define who (user or group of users) and what (which cloud apps) and where (which locations and networks) a Conditional Access policy is applied to. When integrating with Azure AD Conditional Access, you can configure apps to work with Conditional Access App Control with just a few clicks, allowing you to easily and selectively enforce access and session controls on your organization's apps based on any condition in Conditional Access.
#INCONTROL APPS LIST LICENSE#
In addition to a valid Defender for Cloud Apps license, to use Defender for Cloud Apps Conditional Access App Control, you also need an Azure Active Directory P1 license, or the license required by your IdP solution.Ĭonditional Access App Control uses a reverse proxy architecture and integrates with your IdP.

If you're using Azure Active Directory (Azure AD) as your IdP, these controls are integrated and streamlined for a simpler and more tailored deployment built on Azure AD's Conditional Access tool. Microsoft Defender for Cloud Apps integrates with any identity provider (IdP) to deliver these capabilities with access and session controls. At the same time, you need tools to help protect your organization from data leaks, and data theft, in real time. It's important to enable users in your organization to make the most of the services and tools available to them in cloud apps and let them bring their own devices to work.

You want to stop breaches and leaks in real time, before employees intentionally or inadvertently put your data and your organization at risk. In today's workplace, it's often not enough to know what's happening in your cloud environment after the fact. For more information, see Microsoft Defender for Cloud Apps in Microsoft 365 Defender. Microsoft Defender for Cloud Apps is now part of Microsoft 365 Defender, which correlates signals from across the Microsoft Defender suite and provides incident-level detection, investigation, and powerful response capabilities.
