Leveraging MDCA and MDE Integration to Detect and Block Shadow IT

5 min. readlast update: 09.21.2024
Introduction
 
As organizations adopt cloud-based services and remote work models, the risk of unauthorized applications—commonly referred to as shadow IT—increases significantly. Shadow IT can expose sensitive data to vulnerabilities, complicate compliance, and increase the attack surface. Microsoft Defender for Cloud Apps (MDCA) integrated with Microsoft Defender for Endpoint (MDE) provides a powerful solution to detect, monitor, and manage unauthorized cloud applications. This article will guide you through the process of leveraging MDCA and MDE integration to detect and block shadow IT, with an emphasis on filtering out non-IT applications that may not pose a risk.
 
1. Understanding the Integration of MDCA and MDE
 
MDCA, previously known as Microsoft Cloud App Security (MCAS), is a cloud access security broker (CASB) that offers visibility into cloud applications and services. It helps enforce data protection policies and monitor user activity. MDE, on the other hand, is an endpoint security platform designed to prevent, detect, investigate, and respond to advanced threats. When integrated, these tools provide comprehensive visibility and control over cloud application usage across your organization.
 
2. Setting Up the Integration
 
To set up the integration between MDCA and MDE:
 
1. Enable MDE Integration in MDCA: Navigate to the MDCA portal, go to "Settings," and under "Microsoft Defender for Endpoint," ensure that the integration is enabled.
2. Configure Endpoint Settings in MDE: In the Microsoft 365 Defender portal, go to "Settings" > "Endpoints" > "Advanced Features," and turn on the "Microsoft Defender for Cloud Apps" integration.
3. Deploy MDE Sensor: Ensure that MDE is deployed on all endpoints in your organization to collect the necessary telemetry for shadow IT detection.
 
3. Detecting Shadow IT with MDCA and MDE
 
Once integration is complete, MDCA can leverage endpoint telemetry collected by MDE to identify all cloud apps accessed from managed devices, whether they are sanctioned or unsanctioned. This helps in detecting shadow IT activities such as users accessing unapproved cloud storage, collaboration tools, or SaaS applications.
 
1. Create Discovery Policies: In the MDCA portal, go to "Cloud Discovery" and create discovery policies to detect access to unsanctioned apps. You can categorize applications by risk level, usage patterns, and compliance status.
2. Review Discovered Apps: Analyze the discovered applications and identify which ones are unauthorized or pose a security risk. MDCA provides a risk score for each app based on various factors such as certifications, data handling, and security controls.
 
4. Filtering Out Non-IT Applications
 
Not all detected applications are relevant from a security standpoint. For example, some non-IT apps like streaming services, social media platforms, or shopping websites may not pose a significant risk to your organization. Filtering these out is crucial to avoid false positives and focus on real threats.
 
1. Use App Tags and Categories: MDCA classifies applications into different categories such as IT, Business, and Non-IT. You can use these categories to filter out non-IT applications in your discovery policies.
2. Custom App Tagging: If certain applications are misclassified or not classified at all, you can create custom tags. For example, you can tag apps like Netflix or Spotify as "Non-IT" and exclude them from shadow IT policies.
3. Define Exclusion Policies: In your discovery policy, add exclusion rules for specific app categories or individual apps that you have tagged as non-IT. This will prevent them from triggering alerts.
 
5. Blocking Shadow IT
 
After identifying and filtering out non-IT applications, the next step is to block the use of unauthorized IT applications that pose a risk.
 
1. Create App Control Policies: In MDCA, go to "Control" > "App Governance" and create policies to block access to unsanctioned apps. You can enforce these policies based on user, group, device, or application criteria.
2. Integrate with Conditional Access: Use Microsoft Entra ID Conditional Access policies to restrict access to cloud apps based on compliance status. For example, block access to high-risk cloud apps from devices that do not meet your security standards.
3. Use Custom Blocking Scripts: For more granular control, you can deploy custom scripts via MDE to block or warn users when they attempt to access unsanctioned cloud services.
 
6. Monitoring and Reporting
 
Regular monitoring and reporting are essential to ensure that your shadow IT management strategy is effective. MDCA provides comprehensive dashboards and reports that can help you track cloud app usage trends, policy violations, and risk levels over time.
 
1. Cloud App Activity Reports: Generate reports to review cloud app activity, focusing on newly discovered applications and any anomalous behavior.
2. Policy Violation Reports: Monitor reports for policy violations and take corrective action, such as updating your app control policies or educating users about acceptable use policies.
 
Conclusion
 
Integrating MDCA with MDE provides a robust solution for detecting and blocking shadow IT, helping you maintain control over cloud app usage in your organization. By filtering out non-IT applications, you can reduce noise and focus on the real threats posed by unauthorized IT apps. Regular monitoring and policy updates are key to staying ahead of evolving risks and ensuring compliance.
 
This approach not only enhances security but also empowers IT teams to provide a safer and more productive cloud environment for all users.
Was this article helpful?