Microsoft Defender for Cloud Apps (MDA)

m365-azureIdentity & DirectoryCloud Admin PortalSIEM / Log Aggregator

Location

Microsoft Defender Portal > Cloud Apps > Activity Log (or API)

Description

Cloud Access Security Broker (CASB) logging OAuth app activity, shadow IT discovery via cloud app usage, impossible travel alerts, mass download detections, suspicious inbox manipulation, and governance actions across connected cloud services.

Forensic Value

MDA provides visibility into cloud application usage and data movement that other M365 logs miss. The Activity Log records granular actions across connected apps (Box, Salesforce, AWS) in addition to M365 services. Anomaly detection policies surface impossible travel, activity from anonymous IPs, and mass file downloads. OAuth app governance alerts identify malicious app consent grants. Session policies can reveal real-time data exfiltration attempts.

Tools Required

Microsoft Defender PortalPowerShellMicrosoft Graph APISIEM (Sentinel)