Office 365 Advanced Security Management is now Office 365 Cloud App Security.
Office 365 Cloud App Security gives you insight into suspicious activity in Office 365 so you can investigate situations that are potentially problematic and, if needed, take action to address security issues. With Office 365 Cloud App Security, you can do all of the following:
See how your organization's data in Office 365 is accessed and used
Define policies that trigger alerts for atypical or suspicious activities
Suspend user accounts exhibiting suspicious activity
Require users to log back in to Office 365 apps after an alert has been triggered
Important: Office 365 Cloud App Security is available in Office 365 Enterprise E5. If your organization is using another Office 365 Enterprise subscription, Office 365 Cloud App Security can be purchased as an add-on. (As a global admin, in the Office 365 admin center, choose Billing > Add subscriptions.) For more information about plan options, see Compare All Office 365 for Business Plans.
As a global administrator or security administrator for Office 365, go to https://protection.office.com and sign in using your work or school account for Office 365. (This takes you to the Security & Compliance Center.)
In the Security & Compliance Center, choose Alerts > Manage advanced alerts.
(If Office 365 Cloud App Security is not yet enabled, turn on Office 365 Cloud App Security.)
Choose Go to Office 365 Cloud App Security.
The Cloud Discovery Dashboard, also referred to as Productivity App Discovery, shows information about cloud app usage within your organization. You can view information about apps, users, traffic, transactions, and more using this dashboard. The Cloud Discovery Dashboard resembles the following image:
To get to this dashboard, in the Office 365 Cloud App Security portal, go to Discover > Cloud Discovery dashboard.
You can use your traffic log files from your firewalls and proxies, and view information gathered from your traffic logs on the Activity log page in Office 365 Cloud App Security.
To get to this page, in the Office 365 Cloud App Security portal, go to Investigate > Activity log.
The more details that are included in those log files, the better visibility you'll have into user activity. You can use log files from Barracuda, Blue Coat, Check Point, Cisco, Clavister, Dell SonicWALL, Fortinet, Juniper, McAfee, Microsoft, Palo Alto, Sophos, Squid, Websence, Zscaler, and more.
With Office 365 Cloud App Security, you can allow or prevent people in your organization to use third-party apps that access data in Office 365.
To get to this page, go to Investigate > App permissions.
Save time in defining policies by using one or more templates as a starting point. You can choose from a variety of templates. For example, you can choose from templates that detect general anomalies, identify users logging in from a risky IP address, detect ransomware activities, detect administrator activities from non-corporate IP addresses, and more.
To view/use policy templates, in the Office 365 Cloud App Security portal, go to Control > Templates.
To learn more about policies, see the following resources:
Alerts are set up for two types of policies: Anomaly detection policies that detect suspicious activity; and Activity policies, which are defined for activities that might be atypical for your organization. To view alerts for your organization, choose Alerts in the navigation bar across the top of the screen.
As alerts are triggered you can review them to learn more about what is going on. Then, if the activity is still suspicious, you can take action. For example, you can notify a user about an issue, suspend a user from signing in to Office 365, or require a user to sign back in to Office 365 apps.
To learn more about alerts, see the following resources: