This article is designed to help you understand how to filter and create action policies for Defender for Identity activities using Microsoft Defender for Cloud Apps.

For more information about how to complete your integration, see Defender for Identity integration with Defender for Cloud Apps.

Core Defender for Identity functionality can be represented in the Microsoft Defender for Cloud Apps portal. This provides a singular administration experience around investigating risky users in your enterprise, and the ability to filter activity based on both on-premises and cloud identity events.


For complete user investigation features across the hybrid environment, you must have:

  • A valid license for Microsoft Defender for Cloud Apps
  • A valid license for Microsoft Defender for Identity connected to your Active Directory instance


If you don’t have a subscription for Defender for Cloud Apps, you can use the Defender for Cloud Apps portal to investigate Defender for Identity alerts and deep dive on users and their on-premise managed activities however insights related to your cloud applications will remain unavailable.

Filter Defender for Identity activities in Defender for Cloud Apps

Defender for Identity activities can be accessed from the main Defender for Cloud Apps Investigate menu by selecting the Activity log submenu, or from the Alerts menu by status, category, severity, application, user name, or policy.

To access Defender for Identity activities by user:

  1. Filter the Alerts queue using the USER NAME field. Filter alerts by username.
  2. Select the user name on any of the alerts in the resulting list to open the User page of the user you wish to investigate.
  3. Filter activities of the user using the available fields, or add a new filter rule using the + button. Filter activities of the user.

Create activity policies in Defender for Cloud Apps

After filtering activities and identifying activity policies you’d like to implement, or noncompliance within your organization, use the Create new activity policy option from the filter menu to immediately create a new customized policy per user, device, or tenant.

To create a new activity policy:

  1. From any Activity log page, apply a filter (such as APP, User Name, Activity type).
    • To filter to activities from Defender for Identity select the Active Directory option in the APP filter. Create new activity policy.
  2. Select the New policy from search button.
  3. Add a Policy nameCreate new activity policy -step 2.
  4. Add a policy Description.
  5. Assign the severity of the policy.
  6. Select a category for the policy.
  7. Choose or modify filters to create and assign for the policy.
  8. Refine or add more filters.
  9. Save and apply the new policy.

Next steps

Learn more about Investigation priority scoring and additional features of Microsoft Defender for Cloud Apps functionality.

Join the Community

Do you have more questions, or an interest in discussing Defender for Identity and related security with others? Join the Defender for Identity Community today!

Source : Official Microsoft Brand
Editor by : BEST Antivirus KBS Team

How useful was this post?

Click on a star to rate it!

Average rating 0 / 5. Vote count: 0

No votes so far! Be the first to rate this post.