When Defender for Cloud Apps manages a SaaS application, the first step is to establish direct integration so that Defender for Cloud Apps can see activities and apply policies. Concretely, this means configuring an app connector for the cloud app.
Therefore, the correct first step is:
D. Configure an app connector to Defender for Cloud Apps.
Only after the app is connected and Defender for Cloud Apps has visibility into user activities can you create and enforce an access policy for that app.
To create an access policy for a registered app like App1 in Microsoft Defender for Cloud Apps, you need to first establish integration between the app and Defender for Cloud Apps. This is achieved by configuring an app connector.
App connector: This enables Microsoft Defender for Cloud Apps to monitor and manage the app's activities. It integrates the app with Defender for Cloud Apps to provide visibility and enforce policies.
After the app connector is configured, you can proceed to create access policies or other governance actions.
I registered "Demo App" in Entra and added a Conditional Access App Control Policy targeting "Demo App".
After that, I added an Access Policy with Activity: App > Automatic Entra ID onboarding > equals > "Demo App"
--> The Apps in Entra are automatically onboarded. We do not need to connect an app (answer D)
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
GetEsn
Highly Voted 4 months, 1 week agowafferrr
Most Recent 1 week agohwoccurrence
1 month, 4 weeks agoVince_MCT
3 months agoJohnDoe47
3 months, 3 weeks agoXive
4 months agoHelloItsSam
4 months agoGetEsn
4 months, 1 week ago