Introduction
Stop shadow IT attacks in their tracks
()
What you should know
()
Lab requirements
()
1. Intro to Shadow IT Threats and Strategy
What is shadow IT?
()
The tenets of shadow IT prevention
()
Enter the Cloud Access Security Broker (CASB)
()
2. Enabling and Enriching Cloud Discovery
CAS feature flyover
()
Configure Cloud App Discovery and connectors
()
Enrich and anonymize discovery data
()
Enabling discovery outside the corporate network
()
3. Extending Control and Protection
Controlling SaaS access and activity
()
Classification and protection of confidential info
()
Controlling access to unmanaged devices
()
Controlling access to noncompliant devices
()
Ex_Files_MSFT_Cybersecurity.zip
(1.0 MB)