Summary: How to start using Office 365 Cloud App Security.
Date: Around 2015
Refactor: 7 March 2025: Checked links and formatting.
Cloud App Security is part of the E5 EMS license structure and provides some good insight into what's going on in your Office 365 cloud environment.
The portal can be reached from the office365 Admin portal: https://portal.office.com → Admin Centers → Cloud App Security. This will patch you through to something like: https://COMPANY.portal.cloudappsecurity.com. Or you can access the portal directly through: https://portal.cloudappsecurity.com
All global admins have access to the Cloud App Security Portal. You can also add people to the Security Readers role in https://portal.azure.com → User → Directory role. And finally you can grant users access inside the Cloud App Security Settings → Manage Admin Access
You can use Cloud App Security to get an overview of all apps that are authorized by users to access Company data.
By default, users can register apps themselves and consent to data access. You can disable this by setting these two settings:
Once the apps are registered you can Approve or Block them in the Cloud App Security Portal:
You can remove an individual user from access to an app which is convenient if you don't want to block access to the app for the entire company in a single click. You need to take two steps, you need to configure the app to require user assignment (only once) and then remove the individual users.
It might take up to an hour for the setting to take effect (time measured when testing) but then the user gets an notification that the application is no longer available.
To get an overview of data that is publicly shared or shared with external guests:
If you have the need to unshare files you can do so:
Go to the Alerts dashboard to view the open alerts. If required you can set to receive emails for these alerts in your own admin settings. Go to your profile → User Settings → Notifications (note that your account needs a valid email address).
The alerts gets triggered by policies that are maintained by Microsoft. You can setup your own policies as well, or modify the default policies. To do so: