Unlocking Defender for Cloud Apps: Your Swiss Army Knife of Cloud Security

Hey everyone, it’s Doug from Doug Does Tech! I’m thrilled to introduce a new video series where we explore various Defender technologies by Microsoft. Today, we’re kicking off with Defender for Cloud Apps.

I like to think of this tool as the Swiss Army Knife of Microsoft security. In this video, I’ll delve into its placement within the Microsoft security stack, highlight its top-level features, and walk you through the setup process.

In future videos, I plan to dive deeper into operationalizing Defender for Cloud Apps, exploring its different components and functionalities.

If you find this content helpful, remember to like, subscribe, and hit that bell icon for more tech insights and tips. Stay tuned for the next video!

L I N K S
MDCA Overview: https://learn.microsoft.com/en-us/defender-cloud-apps/what-is-defender-for-cloud-apps
Connected Apps: https://learn.microsoft.com/en-us/defender-cloud-apps/enable-instant-visibility-protection-and-governance-actions-for-your-apps
NINJA Training: http://aka.ms/MDCANinjaTraining

C H A P T E R S
00:00 Introduction
00:48 Tech Overview
06:03 Setup Defender for Cloud Apps
11:52 Wrap Up

Welcome Back

https://www.youtube.com/watch?v=B1mNJ0xbFNc

After a little break, I’m back and ready to dive into some exciting new content. Get ready for deep dives into Microsoft 365 security, Defender, and Purview. Don’t worry, I’ll keep it relaxed and easy to understand, even for beginners.

Thank you for your patience and support. If you have content or questions you would like me to cover put them into the comments and I will do my best to make a video on them.

-Doug

Is MFA Enough? Implementing FIDO Keys with Microsoft 365

Traditional MFA may no longer suffice as a robust security measure to safeguard your crucial accounts. Hackers have devised new methods to breach your sign-in process, even with MFA in place. Hence, we require stronger forms of authentication. In this video, I delve into the array of options supported by Microsoft for robust authentication and demonstrate precisely how to implement FIDO Keys.

L I N K S
Best Place to Start! Require FIDO for your Admin
https://learn.microsoft.com/en-us/entra/identity/conditional-access/how-to-policy-phish-resistant-admin-mfa

Buy a FIDO Key
https://amzn.to/3Jq75pF (Affiliate Link)

Authentication Strengths
https://learn.microsoft.com/en-us/entra/identity/authentication/concept-authentication-strengths

What is FIDO2
https://www.microsoft.com/en-us/security/business/security-101/what-is-fido2

00:00 Introduction
00:37 Stong Auth Ooptions
02:50 MFA is Good But FIDO Makes it Best!
04:20 Implementing Authentication Strengths
06:21 Setup your Fido Key
06:58 Enforce FIDO with Conditional Access