Microsoft Defender for Cloud Apps Features
Analysis (3)
User Analytics
Allows for reporting and documentation of individual user behavior and privileges.
Cloud Gap Analytics
Analyzes data associated with denied entries and policy enforcement, giving information of better authentication and security protocols.
Anomoly Detection
Monitors acivity related to user behavior and compares activity to benchmarked patterns.
Functionality (3)
SSO
Provides a single access point for users to access multiple cloud products without multiple logins.
Cloud Registry
Details SaaS products the cloud security product can integrate with and provide security for.
Mobile Device Mangement
Offers the ability to set standards for types of mobile devices and networks capable of accessing data.
Security (8)
Governance
Allows users to create, edit, and relinquish user access privileges.
Data loss Prevention
Stores data securely either on premise or in an adjacent cloud database to prevent loss of data at rest.
Data Encryption/Security
Manages policies for user data access and data encryption.
Access Control
Supports LDAP Protocol to enable access control and governance.
Encrypted Storage
Provides some level of encryption of files and data in transit and sensitive information while it lives online.
Anomoly Detection
Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns.
Data loss Prevention
Stores data securely either on premise or in an adjacent cloud database to prevent loss of data at rest.
Policy Enforcement
Allows administrators to set policies for security and data governance.
Administration (3)
Reporting and Monitoring
Access pre-built and custom reports to monitor user activity and storage.
Breadth of Partner Applications
To what extent are there partner applications readily available for integrating into this product? Partner applications typically provide complementary, best of breed functionality not offered natively in this product.
Auditing
Documents access and alterations of the database for analytics and reporting.
Access Control (4)
User, Role, and Access Management
Allows administrators to provision access based on the individual user and their role.
Access Rights
Defines which users have access to the different modules of the software and how.
User Analytics
Allows for reporting and documentation of individual user behavior and privileges.
Compliance Monitoring
Monitors data quality and send alerts based on violations or misuse.





