-
Get shadow IT under control in your organization. Learn about the risks of shadow IT and how to identify and eliminate threats with tools in the Microsoft cybersecurity stack.
Overview
Syllabus
-
Introduction
- Stop shadow IT attacks in their tracks
- What you should know
- Lab requirements
- What is shadow IT?
- The tenets of shadow IT prevention
- Enter the Cloud Access Security Broker (CASB)
- CAS feature flyover
- Configure Cloud App Discovery and connectors
- Enrich and anonymize discovery data
- Enabling discovery outside the corporate network
- Controlling SaaS access and activity
- Classification and protection of confidential info
- Controlling access to unmanaged devices
- Controlling access to noncompliant devices
- Next steps