Office365 Threat Monitoring Introduction

Updated 1 week ago by Andrew Hill

Big Picture

What

Microsoft has consistently improved their security products over the past few years, but their web portals can be incredibly crowded and irritating to use. Worst of all, the requirement to log in to each tenant separately is so annoying that you can miss important security information in the portal. Our Microsoft365 cloud apps fix these problems by providing you exactly what you need in your RocketCyber console.

How

The information is pulled from Microsoft Graph, which has access to data from all of Microsoft's cloud-enabled products. When you enter your credentials during configuration, we securely store a Graph access token (not your credentials) on a secure server. We then aggregate data from all your customers in near real-time and select only potentially relevant security events for display. Like all RocketCyber apps, additional search and whitelisting capability allow you to focus on only what is relevant to your business.

Is This Result Okay?

If you aren't sure what you should be doing with these results, select the app you have questions about in the table below. The app-specific help page will give some basic examples of when to be worried and when to hit snooze one more time (these are examples, this does not list every possible scenario).

For information on a specific app, select the app below. For information on what Microsoft licenses are needed for each app, see the FAQ

Office 365 Secure Score

Azure Directory Monitor

Office 365 Login Monitor


How did we do?


Powered by HelpDocs

Powered by HelpDocs