Read this article to get a quick overview of updates and new features in Office 365 Cloud App Security (formerly known as Office 365 Advanced Security Management), which is powered by Microsoft Cloud App Security.
This article is updated frequently, as features are added or improved. Office 365 Cloud App Security updates are released approximately two weeks after Microsoft Cloud App Security updates.
The most recent update to this article occurred during the week of May 7, 2018.
Office 365 Cloud App Security release 121
Released May 6, 2018
Releasing with Microsoft Cloud App Security release 121:
Anomaly detection policy improvements. Office 365 Cloud App Security's anomaly detection policies have been improved to include two new types of threat detection that are gradually rolling out:
Ransomware activity. Ransomware detection capabilities are extended with anomaly detection to give you more comprehensive coverage against sophisticated ransomware attacks.
Terminated user activity. Terminated user activity enables you to monitor the accounts of terminated users who may have been de-provisioned from corporate applications, but who might still have access to certain corporate resources.
To view your Anomaly detection policies, in the Office 365 Cloud App Security portal, choose Control > Policies.
Office 365 Cloud App Security release 120
Released April 22, 2018
Releasing with Microsoft Cloud App Security release 120:
Internal applications as user activities. For Office 365 and Azure Active Directory (Azure AD), we are now gradually rolling out the ability to detect internal applications as user account activities performed by the Office 365 and Azure AD applications (both internal and external). This enables you to create policies to alert you if an application performs unexpected and unauthorized activities.
More fields in app permissions list export. When exporting an app permissions list to csv, additional fields such as publisher, permissions level and community usage are included to assist with the compliance and investigation process.
Office 365 Cloud App Security release 119
Released April 1, 2018
Releasing with Microsoft Cloud App Security release 119:
Improvements to Cloud Discovery. The Cloud Discovery provides more information about top users and IP addresses, making it easier to view usage details about Office 365 and other apps. To learn more, see Review app discovery findings in Office 365 Cloud App Security.
Office 365 Cloud App Security release 118
Released March 18, 2018
Releasing with Microsoft Cloud App Security release 118:
Barracuda support. Cloud Discovery now supports Barracuda F Series firewalls and Barracuda F-Series firewall web log streaming.
Office 365 Cloud App Security release 117
Released March 6, 2018
Releasing with Microsoft Cloud App Security release 117:
i-FILTER support. Cloud Discovery now supports i-FILTER.
Office 365 Cloud App Security release 116
Released February 18, 2018
Releasing with Microsoft Cloud App Security release 116:
Anomaly detection policy enhancements. Anomaly detection polices in Office 365 Cloud App Security were enhanced with new scenario-based detections including impossible travel, activity from a suspicious IP address and multiple failed login attempts. The new policies are automatically enabled, providing out-of-the-box threat detection across your cloud environment. In addition, the new policies expose more data from the Office 365 Cloud App Security detection engine, which can help speed up the investigation process and contain ongoing threats. To learn more, see the Microsoft Cloud App Security article, Get instantaneous behavioral analytics and anomaly detection.
Log parser support for Checkpoint formats. The Cloud Discovery log parsers now support two additional Checkpoint formats: XML, and KPC.
Office 365 Cloud App Security release 114
Released January 21, 2018
Releasing with Microsoft Cloud App Security release 114:
Service status. You can now check the current Office 365 Cloud App Security service status by going to Help > System status.
Custom queries for Activity log. Beginning in version 114, the ability to create and save custom queries in the Activity log is rolling out gradually. Custom queries enable you to create filter templates that can be reused for deep-dive investigation. In addition, suggested queries have been added to provide out-of-the-box investigation templates to filter your activities and discovered apps. Suggested queries include custom filters to identify risks such as impersonation activities, administrator activities, risky non-compliant cloud storage apps, enterprise apps with weak encryption, and security risks. Use the suggested queries as a starting point, modify them as needed, and then save them as a new query.
Office 365 Cloud App Security release 113
Released January 8, 2018
Releasing with Microsoft Cloud App Security release 113:
Log parser support for generic formats. The Cloud Discovery log parsers now support the following generic formats: LEEF, CEF, and W3C.
Office 365 Cloud App Security release 112
Released December 24, 2017
Releasing with Microsoft Cloud App Security release 112:
Relevant insight drawer. In the Activity log, you can now access the relevant insight drawer by clicking on a user name or IP address.
Ability to view more activities with a click. In the relevant insight drawer, you can click the clock icon to view all activities performed within 48 hours of a selected activity.
Log parser improvements for Juniper SRX. Improvements were made to the Cloud Discovery log parser for Juniper SRX.
Office 365 Cloud App Security release 111
Released December 10, 2017
Releasing with Microsoft Cloud App Security release 111:
Time filter improvements. Time filters are now easier to use. To access a time filter, in a view, such as Activity log, Policies, Alerts, using the Advanced view, choose Date in the list of filters. Then choose an option, such as before, after, or in between to apply the time filter.
Office 365 Cloud App Security release 110
Released November 26, 2017
Releasing with Microsoft Cloud App Security release 110:
SIEM server integration now generally available. Connect your SIEM server to Office 365 Cloud App Security. You can now send alerts and activities automatically to your SIEM server of choice by configuring SIEM Agents. See Integrate your SIEM server with Office 365 Cloud App Security.
Easier access to help content. Using the new question mark in the upper right corner, you can now access the help content from within the pages of the Office 365 Cloud App Security portal. Each link is context-sensitive, taking you to the information you need, based on the page you’re on.
Send us feedback. Using the smiley face in the upper right corner, you can now send feedback from every page of the Office 365 Cloud App Security portal. This enables you to report bugs, request new features and share your experience directly with the Office 365 Cloud App Security team.
Office 365 Cloud App Security release 102
Released August 13, 2017
Releasing with Microsoft Cloud App Security release 102:
New user investigation actions enable an added level of drill-down to user investigations. On an Investigate page, you can hover on an activity, user, or account and apply it as a filter, and from there, you can view related activities or events.
Office 365 Cloud App Security release 100
Released July 17, 2017
Releasing with Microsoft Cloud App Security release 100:
Security extensions is a new dashboard where you can centrally manage all your security extensions for Office 365 Cloud App Security, including API tokens and SIEM agents. To view the Security extensions dashboard, follow these steps:
Go to https://protection.office.com and sign in using your work or school account for Office 365. (This takes you to the Security & Compliance Center.)
Go to Alerts > Manage advanced alerts.
Choose Go to Office 365 Cloud App Security.
Choose Settings > Security extensions.
Improved parsing. Improvements were made in the Cloud Discovery log parsing mechanism. Internal errors are significantly less likely to occur.
Expected log formats. The expected log format for Cloud Discovery logs now provides examples for both Syslog format and FTP format.