In this video we show you how cloud app security can help you protect your information using built anomaly detections and user-defined deterministic rules. These two detection engines complement each other and allow you to have wide coverage to different security scenarios such as malicious insiders and data exfiltration. Let's start by looking at the anomaly detection capabilities.
Configuring anomaly detection policies with Microsoft Cloud App Security Print
Created by: Shekhar Rathour
Modified on: Wed, 5 Aug, 2020 at 9:02 PM
Did you find it helpful?Send feedback
Sorry we couldn't be helpful. Help us improve this article with your feedback.