Setup Integration of Defender for Cloud Apps with Entra ID

To set up Defender for Cloud Apps with Entra ID, we’ll create an Entra Conditional Access policy that re-directs app sessions to Microsoft Defender for Cloud Apps. Let’s walk through the process of creating this policy.

STEP 1 – Create a Conditional Access Policy

Example: Now, let’s go through the steps for creating a Conditional access policy that prevents downloads from Office 365 applications on non-compliant devices. This policy will utilize the Defender for Cloud Apps Conditional Access App Control feature to block downloads on such devices.

Once you establish this conditional access policy, all Microsoft 365 traffic will be routed through the Defender for Cloud Apps Proxy for application monitoring. The action will be blocked if someone attempts to download any document or data from a non-compliant device. Let’s check the steps:

  • Login on Entra admin center (
  • Search for Entra ID Conditional Access to Access CA Policies page.
  • Click on + New Policy to create a CA Policy and configure the settings as per the below information:
NamePrevent downloads from unmanaged devices
Users and GroupsInclude: All usersExclude: Your breakglass users
Cloud apps or actionsSelect apps: Office365Exclude: None
ConditionsClient apps: Browser
Device StateInclude: All device stateExclude: Devices Marked as Compliant
SessionSelect Use Conditional Access App Control
Block downloads

In the Session control settings, you have three options: Block downloads, Monitor only, or use a custom policy. For a specific requirement of blocking downloads when users use Microsoft 365 applications on unmanaged or non-compliant PCs, you selected the Block downloads option in the Session control setting of the Conditional Access policy.

STEP 2 – Sign in to the M365 Apps

As users continue to Use/Sign in to Microsoft 365 apps, the Microsoft 365 App connection in Defender for Cloud Apps will automatically refresh to update the connection status, appearing under Available controls as part of Entra Conditional Access.

After creating a Conditional Access policy, you will not see App connections created under Defender for Cloud Apps. At least one user must Initiate a connection with any of Microsoft 365 Apps or Office 365 apps, which will proxy through Defender for cloud apps.

After waiting for a couple of hours, you will see App connections created, as shown in the screenshot below. Microsoft 365 admin center – General is listed under the App connection. This connection is automatically established once at least one user signs in to the app, and their traffic is routed through Defender for Cloud Apps.

After creating the above Conditional Access Policy
After creating the above Conditional Access Policy

STEP 3 – Sync Microsoft Teams App with Defender for Cloud Apps

To begin monitoring Microsoft Teams through Defender for Cloud Apps and manage it using the Conditional Access Policy, you must Sign in to the Microsoft Teams app at least once via a web browser. Once you do that, the connection will be proxied according to our CA policy, and the Microsoft Teams connection will be established and visible under Apps on the Defender for Cloud Apps portal.

  • Sign in to Microsoft Teams using any web browser.
  • Once you log in, you’ll notice that the URL in the address bar indicates that the Microsoft Teams application is being proxied via MDCA (Microsoft Defender for Cloud Apps). You’ll then be presented with the following screen. You can click on “Continue to Microsoft Teams“.
  • Additionally, you can click Hide this notification for all apps for one week to prevent you from receiving this notification whenever you attempt to access any Office 365/Microsoft 365 application.
Sync Microsoft Teams App with Defender for Cloud Apps
Sync Microsoft Teams App with Defender for Cloud Apps
  • After a few minutes, the app will be synchronized with the Cloud App Security portal, as shown in the screenshot below.
  • You can sync other apps by signing in to each one individually or waiting for users to access the applications. In that case, Defender for Cloud apps will collect the data for that app, which will also appear under the Conditional Access App Control apps tab.
  • The screenshot below shows that the Microsoft Teams – General [PREVIEW] app is now under the Conditional Access App Control apps.
  • When you click on the Microsoft Teams – General connection on Defender for cloud apps portal, you can access the Activity log tab to gather more information about user sign-ins, including successes and failures.
  • This log provides details on IP information, location, device used, and the date and time of each login. You can also filter the results by users, IP address, location, or specific activities.
  • Now that Microsoft Teams app data is synchronized with Defender for Cloud Apps, you can create session policies to inspect and monitor the application actively in real-time.
  • You can restrict certain user actions while using Microsoft Teams, such as copying, pasting, or printing information, and sending or receiving sensitive data via chat, such as passwords, bank, credit card information, or social security numbers.
  • Click on each event to view more details, such as its Type, Source, App, and Device type.

End-user Experience

We’ve previously set up a Conditional Access Policy to prevent downloads from using Office 365 Apps from uncompliant devices. Let’s observe this policy: Prevent downloads from unmanaged devices in action.

  • Launch the Microsoft Teams App.
  • Try to download a file uploaded to the Microsoft Teams chat.
  • You will receive an error message: Download blocked. Downloading <filename> is blocked by your organization’s security policy.
End-user Experience
End-user Experience


In this blog post, we’ve covered the integration of Entra ID with Defender for Cloud Apps, primarily using the Microsoft 365 Defender Portal for configuration. It’s crucial to remember to create a Conditional Access Policy to synchronize the apps with Defender for Cloud Apps, enabling the monitoring of traffic and data analysis. We’ve also demonstrated the error message that an end user would encounter when downloading a file from an uncompliant device.

Leave a Comment