Microsoft Adds Auto-Remediation to SaaS Security Tool
- By Kurt Mackie
- August 10, 2017
Microsoft this week announced the addition of an auto-remediation capability to its Cloud App Security service, enabling administrators to compel user log-ins and invalidate user sessions in response to certain kinds of security threats.
The Cloud App Security service, which launched commercially last year, tracks the use of Software as a Service (SaaS) applications by end users in an organization. It ranks SaaS applications so that IT departments can better assess their risks.
The service is based on Adallom technology that Microsoft acquired when it bought that company about two years ago.
The Cloud App Security service will detect things like the sharing or downloading of sensitive files from atypical locations, which will send an alert to the management portal. With the auto-remediation feature addition, it's now possible for IT pros to specify certain actions to take when such threats are detected.
For instance, IT pros can set the service to revoke "all user sessions." Next, they can require end users to log back into their Office 365 or Azure Active Directory accounts.
The auto-remediation feature also permits IT pros to revoke the sessions associated with a compromised account by "invalidating all the user's refresh tokens." The security practice of simply disabling an account in such cases isn't sufficient to ward off attackers, Microsoft's announcement contended.
To use the Cloud App Security service, organizations need an Office 365 subscription plan that has support for the Azure Rights Management service, namely the E3, E4 and E5 plans, as well as corresponding Education and Government plans. For a list of Office 365 plans with Azure Rights Management support, see this Microsoft .PDF.
Kurt Mackie is senior news producer for the 1105 Enterprise Computing Group.