Have you been wanting to secure your cloud resources? Do you have agreements with non-Microsoft cloud applications? Do you want to share your cloud security knowledge and experience with others? Wait no longer, the Microsoft Cloud App Security (MCAS) Ninja training is here!
Short Links: http://aka.ms/MCASNinjaTraining and http://aka.ms/MCASNinja.
MCAS has hundreds of amazing videos available and it can sometimes be overwhelming with determining where to start and how to progress through different levels. We've gone through all these and created this repository of training materials - all in one central location! Please let us know what you think in the comments.
The overall structure of the training sessions are split into three main knowledge levels:
Level |
Description |
Level 1: Fundamentals - Beginner level |
Introduction to Microsoft Cloud App Security, licensing, portal navigation, policy basics, and overall definitions. |
Level 2: Intermediate - Associate level |
Capability demos, automatic governance, overall deployment, and connecting 3rd party apps. |
Level 3: Advanced - Expert level |
Power automate, 3rd party IdP integration, and advanced use case scenarios. |
After each level, we will offer you a knowledge check based on the training material you have just finished! Since there’s a lot of content, the goal of the knowledge checks is to help ensure understanding of the key concepts that were covered. Lastly, there’ll be a fun certificate issued at the end of the training! Disclaimer: This is not an official Microsoft certification and only acts as a way of recognizing your participation in this training content.
We plan to update this training on a quarterly basis to ensure that you all have the latest and the greatest training materials. Please do check back often for new training content.
Legend
⤴ External Sites |
Microsoft Cloud App Security - Fundamentals [Beginner Level]
Module 1. Fundamental Level Overview
Training Title | Description |
This video provides a summary of what contents will be covered in the Fundamentals (Beginner level) training | |
This is a Microsoft Cloud App Security (MCAS) Community space that allows users to connect and discuss the latest news, upgrades, and best practices with Microsoft professionals and peers. | |
This document provides use cases that can be leveraged during proof of concept (POC), or as prep step for deploying CASB solution (looking for ways to prioritize deployment components). | |
This blog provides an overview of CASBs and why they are important for securing your cloud resources. |
Module 2. MCAS Introduction
Training Title | Description |
This is an introductory video presentation of Microsoft's Cloud Access Security Broker(CASB): Microsoft Cloud App Security (MCAS) | |
This article outlines the best practice for protecting your organization using MCAS. The Best Practice comes from our overall experience working with Cloud Security and from our customers, like you. | |
This blog provides an update on the MCAS UI changes. | |
This video provides an overview of MCAS licensing information | |
This document is the MCAS licensing datasheet mentioned in the MCAS Licensing video. | |
This document outlines the differences between MCAS and OCAS | |
This document outlines the differences in discovery capabilities between MCAS and AAD | |
This video goes over the result of a Forrester Study from May 2020 with the Total Cost of Ownership and Return on Investment of MCAS. | |
⤴ The Total Economic Impact of Microsoft Cloud App Security |
This site provides an overview of the study, |
Module 3. Initial Settings
Training Title | Description |
This article outlines the steps on connecting the applications to MCAS to enable greater visibility and control over the application. | |
This video walks through how to connect applications to MCAS. | |
This blog provides a brief video overview on how to connect GitHub, Salesforce, Box, and Slack, to MCAS. These 4 videos are also listed below. | |
In this video, we walk through how to connect GitHub to MCAS. | |
In this video, we walk through how to connect Salesforce to MCAS. | |
In this video, we walk through connecting Box to MCAS. | |
In this video, we walk through connecting Slack to MCAS. | |
This video shows how to add your organization's IP address ranges to remove complexities from policy creation, investigation, and improve the accuracy of your alerts. | |
This article outlines the steps on how to configure IP addresses and use IP ranges and tags. | |
This video shows how to import user groups into MCAS to help create relevant policies. | |
This article outlines the steps on how to import user groups from connected apps | |
In this video, we show you how to configure admin roles and set up role-based access controls. | |
This article describes how to manage admin access in MCAS. | |
In this video, we walk through the steps on adding Managed Security Service Provider (MSSP) access to MCAS. | |
|
This video provides an overview of how to view security configuration information in MCAS for Azure, AWS, and GCP. |
This article describes how to access the security configuration information for Azure, AWS, and GCP in MCAS. |
Module 4. Cloud Discovery
Training Title | Description |
This blog details how to get started in Cloud Discovery in MCAS. | |
This article gives a basic overview of how to navigate and use the dashboard. | |
This article provides guidance on working with the discovered apps and dives deeper into the information provided by the dashboard. | |
This video provides an overview of how MCAS evaluates the risk over discovered SaaS apps in your environment. | |
This video provides an overview of MCAS's cloud apps discovery feature. |
Module 5. Information Protection and Real-Time Controls
Training Title | Description |
This video demonstrates how to connect office 365 to MCAS and enable our powerful capabilities across DLP, Threat Protection, and more. | |
In this video, we explore what Conditional Access App Control is, how to deploy and configure it, and testing a scenario (Microsoft Teams). | |
This video provides an overview of some of the governance actions that can be taken with MCAS. | |
In this video, we walk through how to configure real-time monitoring and control across your cloud apps leveraging our powerful, native integration with Azure AD conditional Access to provide inline controls for your downloads. | |
This article walks you through a tutorial on how to create a session policy to block the download of sensitive information. | |
In this video, we walk through how to configure real-time monitoring and control across your cloud apps leveraging our powerful, native integration with Azure AD conditional Access to provide inline controls for your uploads. | |
This blog explains what "Unified Labeling" is and how to use it in the migration scenario. |
Module 6. Threat Detection
Training Title | Description |
In this video, we walk through MCAS's detection capabilities that allow you to identify advanced attackers and insider threats. | |
This video provides a brief overview of User & Entity Analytics (UEBA) in MCAS. | |
In this video, we explore how MCAS can help you identify when users authorized OAuth apps, detect risky apps, and evoke access to risky apps. | |
This article provides general information on alerts that are detected by MCAS, and practical guidance on what needs to be done for alert investigation and remediation. | |
This article provides instructions on using MCAS to manage OAuth applications. |
Knowledge Check - MCAS Fundamentals
Microsoft Cloud App Security - Intermediate [Associate Level]
Module 1. Intermediate Level Overview
Training Title | Description |
This video provides a summary of what contents will be covered in the Intermediate (Associate level) training | |
This is an overview video that discusses the different pillars and configuration steps for MCAS with demo. | |
This article walks through how to secure access for applications with MCAS. |
Module 2. Cloud Discovery
Training Title | Description |
This interactive guide walks through discovering, protecting, and controlling your apps. | |
This article goes over on what are the cloud discovery policies within your MCAS environment. | |
This article provides you with instructions on excluding certain entities' data from being part of the Cloud Discovery data for reporting. | |
This article walks through the process of integrating MDE (formerly MDATP) and MCAS and how simple the integration is - without requiring an extra agent or proxy. | |
This video details the MCAS cloud discovery pillar and how to deploy a log collector. | |
If you work with both Cloud App Security and Zscaler, you can integrate the two products to enhance your security Cloud Discovery experience. | |
If you work with both Cloud App Security and iboss, you can integrate the two products to enhance your security Cloud Discovery experience. | |
If you work with both Cloud App Security and Corrata, you can integrate the two products to enhance your security Cloud Discovery experience. | |
If you work with both Cloud App Security and Menlo, you can integrate the two products to enhance your security Cloud Discovery experience. |
Module 3. Information Protection and Real-Time Controls
Training Title | Description |
In this video, we walk through how to configure a file policy to detect document fingerprinting in your file repositories using MCAS. | |
In this video, we walk through how to set up policies to detect document fingerprinting using Microsoft 365. | |
In this interactive guide, we walk through common scenarios where you can control your information with MCAS. | |
This blog walks through how to secure and connect your GitHub instance in MCAS. | |
This video walks through how to protect your GitHub instance using MCAS. | |
This blog walks through how to secure and connect your Box instance in MCAS. | |
This video walks through how to protect your data in Box using MCAS. | |
This blog walks through how to protect your Slack environment using MCAS. | |
This article goes over the capabilities in MCAS that can protect the Slack Enterprise environment. | |
This blog walks through how to secure and connect your AWS instance in MCAS. | |
This video walks through how to connect to AWS for security auditing in MCAS. | |
This video walks through how to connect to AWS for security configuration in MCAS. | |
This video walks through how to connect to AWS for laaS protection in MCAS. | |
This article provides information on how MCAS protects the One Login environment. | |
This article provides information on how MCAS protects the Zendesk environment. | |
This article steps through how to connect MCAS to your existing ServiceNow account using the application's API. | |
This video shows you how MCAS can help you protect your cloud storage apps and ensure that they are not infected with malware. | |
This article explains how malware detection work in MCAS. | |
This video walks you through one of the many use-cases focused on external users using Conditional Access App Control - our reverse proxy solution. | |
This video detailing the policy configuration required to block unauthorized browsers from accessing corporate web applications. | |
This article is a tutorial that walks through how to use admin quarantine to protect your files. | |
This article is a tutorial that walks through applying labels to a sensitive file. | |
This article walks you through how to create information protection policies in MCAS. | |
This blog walks you through some of the top use cases and questions asked regarding when to use MCAS vs when to use MIP. | |
In this video, we walk through the architecture used to configure AWS with AAD and use MCAS to apply additional protections. | |
This blog shows you how to use MCAS to protect AWS Admins and Developers. | |
This article steps through how to integrate Azure information Protection with MCAS. | |
This article provides the recommended MCAS policies to use for SaaS applications. | |
This blog walks through how to configure DLP policies using MCAS. | |
This blog shares our top five custom queries to save for the five use cases. |
Module 4. Threat Detection
Training Title |
Description |
This article shows you how to create threat protection policies within your MCAS environment. |
|
This article is designed to help you understand and navigate the enhanced investigation experience in MCAS and MDL | |
This video provides an overview of MDI capability | |
This blog provides information on where you learn more about Microsoft Defender for Identity | |
This interactive guide shows you the steps on how to manage threats in MCAS. | |
|
This video steps you through how to use the advanced hunting capability to investigate incidence using MCAS. |
Knowledge Check - MCAS Intermediate
Microsoft Cloud App Security - Advanced [Expert Level]
Module 1. Advanced Level Overview
Training Title | Description |
|
This video provides a summary of what contents will be covered in the Advanced (Expert level) training. |
Auto-Triage Infrequent Country Alerts using MCAS & Power Automate |
This blog is part of the Power Automate Blog Series. This blog walks through how to auto-triage country alerts using MCAS and Power Automate. |
This video walks through creating a new Power Automate Flow to automate the triage of infrequent Country alerts in MCAS (Threat Protection Pillar). | |
This video walks through how to use Power Automate Flow to request user validation for file sharing (Data Protection Pillar). | |
In this video, we walk through how to use Power Automate Flow to request manager validation for their team. | |
This blog outlines the steps and guidance on using Power Automate Flow to request manager validation for their team. | |
This video walks you through a new Power Automate Flow on how to remove malicious inbox rules detected in your cloud environment. |
Module 2. Non-Microsoft Party IdP configuration
Training Title | Description |
This article walks you through integrating PingOne with MCAS for Conditional Access App Control using Salesforce as an example. | |
This article walks you through integrating ADFS with MCAS for Conditional Access App Control using Salesforce as an example. | |
This article walks you through integrating Okta with MCAS for Conditional Access App Control using Salesforce as an example. |
Module 3. Conditional Access App Control Steps for non-Microsoft SAAS applications
Training Title | Description |
This video steps through how to use Conditional Access App Control in MCAS for Workplace for Facebook. | |
This video steps through how to use Conditional Access App Control in MCAS for Box. | |
This blog provides additional guidance on real-time protection for Box. | |
This video steps through how to block chats with sensitive data using Conditional Access APP Control in MCAS. |
Module 4. SIEM integration
Training Title | Description |
This video details how to connect Azure Sentinel (Microsoft's SIEM + SOAR product) to MCAS. | |
This video looks at how you can use the provided playbooks to enrich your impacted user profiles, and then consume it in Sentinel, ServiceNow, or Postman. | |
This video walks you through the deployment of a playbook to use to triage your Azure Sentinel incidents. | |
This video details how to connect to third-party SIEM to MCAS. |
Module 5. Advanced Scenarios and Guidance
Training Title | Description |
This video walks you through how to create custom Indicators of Compromise in MCAS. | |
This video guides you on how Microsoft is unifying our threat products. | |
This video walks through blocking apps and sites on iOS, suing Defender for iOS, and using custom indicators of compromise from Microsoft Cloud App Security and Defender for Endpoint integration. | |
This article describes how to interact with Cloud App Security over HTTPS. | |
This article provides more information on configurations to ensure your log collector works when behind a proxy. | |
This interactive guide walks through the steps needed to automate alert management using Power Automate | |
This blog explains how to use Microsoft 365 Defender to address common alerts from MCAS to determine the threats' scope and impact. | |
This blog outlines the use cases for using Microsoft 365 Defender to determine the "Insider Risk" alerts from MCAS. | |
This article shows how to proactively hunt for threats using the Advance Hunting Tool in Microsoft 365 Defender. | |
This blog provides a list of sample queries for Advance Hunting using Microsoft 365 Defender. |
Module 6. Additional Blogs and Information
Training Title | Description |
|
This blog provides guidance on how to configure Azure AD Conditional Access to secure administrative access to Microsoft Cloud App Security (MCAS) and Defender for Identity (Formerly Azure ATP) |
This blog goes over a customer scenario for MCAS and the steps that can be taken to meet their requirements on limiting inherited AAD roles' accesses in MCAS. | |
⤴ MCAS Learning Path | Check out these learning paths for MCAS |
This blog provides information on Cloud App Security Lifecycle Management |
Knowledge Check - MCAS Advanced
Once you've finished the training and the knowledge checks, please go to our attestation portal to generate your certificate - you'll see it in your inbox within 3 to 5 business days (Click Here).
We have a great lineup of updates for the next rendition (next quarter). If you'd like anything covered, please comment below. In addition, please reach out to us if you have any content that you would like to include as well.
We hope you all enjoy this training!
Feedback
Let us know if you have any feedback or relevant use cases/requirements for this portion of Cloud App Security by emailing, CASFeedback@microsoft.com and mention the core area of concern.
Learn More
For further information on how your organization can benefit from Microsoft Cloud App Security, connect with us at the links below:
Join the conversation on Tech Community. Stay up to date—subscribe to our blog. |
Upload a log file from your network firewall or enable logging via Microsoft Defender for Endpoint to discover Shadow IT in your network. |
Learn more—download Top 20 use cases for CASB. |
Connect your cloud apps to detect suspicious user activity and exposed sensitive data. |
Search documentation on Microsoft Cloud App Security. |
Enable out-of-the-box anomaly detection policies and start detecting cloud threats in your environment. |
Understand your licensing options . |
Continue with more advanced use cases across information protection, compliance, and more. |
Follow the Microsoft Cloud App Security Ninja blog and learn about Ninja Training. Go deeper with these interactive guides: · Discover and manage cloud app usage with Microsoft Cloud App Security · Protect and control information with Microsoft Cloud App Security · Detect threats and manage alerts with Microsoft Cloud App Security · Automate alerts management with Microsoft Power Automate and Cloud App Security |
|
To experience the benefits of full-featured CASB, sign up for a free trial—Microsoft Cloud App Security.
Follow us on LinkedIn as #CloudAppSecurity. To learn more about Microsoft Security solutions, visit our website. Bookmark the Security blog to keep up with our expert coverage on security matters. Also, follow us at @MSFTSecurity on Twitter, and Microsoft
Posted at https://sl.advdat.com/3mgsky6