Sase For Securing Microsoft 365 Solution Guide
Sase For Securing Microsoft 365 Solution Guide
RE
D
O V
PFP
EEL
ROR
AT
VEY
IEN
M
IO
WC
ENE
NST
AGR
GUC
UIH
IDD
IE
TEE C T U R E G U I D E
SOLUTION
GUIDE
S EPT E M B E R 2023
Table of Contents
Table of Contents
Preface..................................................................................................................................................................... 1
Audience................................................................................................................................................................................................. 3
Related Documentation....................................................................................................................................................................... 4
Introduction........................................................................................................................................................... 5
Security Challenges.............................................................................................................................................................................. 5
Security Foundation.............................................................................................................................................................................6
Design Details........................................................................................................................................................8
Data Security........................................................................................................................................................................................29
Deployment Details............................................................................................................................................ 46
Summary.............................................................................................................................................................. 66
Preface
GUIDE TYPES
Design guides provide an architectural overview for using Palo Alto Networks® technologies to provide
visibility, control, and protection to applications built in a specific environment. These guides are required
reading prior to using their companion deployment guides.
Deployment guides provide decision criteria for deployment scenarios, as well as procedures for combining
Palo Alto Networks technologies with third-party technologies in an integrated design.
DOCUMENT CONVENTIONS
Cautions warn about possible data loss, hardware damage, or compromise of security.
Blue text indicates a configuration variable for which you need to substitute the correct value for your
environment.
• Command-line commands.
• User-interface elements.
• Navigational paths.
• A value to be entered.
An external dynamic list is a file hosted on an external web server so that the firewall can import objects.
ABOUT PROCEDURES
These guides sometimes describe other companies’ products. Although steps and screen-shots were
up-to-date at the time of publication, those companies might have since changed their user interface,
processes, or requirements.
https://www.paloaltonetworks.com/referencearchitectures
• Provides architectural guidance and deployment details for using Prisma® Access to provide
visibility and control, security posture management, data security, and data protection to your
Microsoft 365 environment.
• Requires that you first read the Securing SaaS with the Next-Generation CASB: Solution Guide. That
solution guide provides architectural insight and guidance necessary for your organization to
secure software-as-a-service (SaaS) applications.
OBJECTIVES
Completing the procedures in this guide, you can successfully deploy policy in Prisma Access to secure
Microsoft 365 applications and data in a SaaS environment. You also enable the following functionality:
• Data security
AUDIENCE
This guide is written for technical readers, including solution architects and design engineers, who want
to deploy the Palo Alto Networks NG-CASB solution to secure SaaS applications. It assumes the reader is
familiar with the basic concepts of SaaS applications, data security, networking, and web security.
RELATED DOCUMENTATION
The following documents support this guide:
• SASE Overview—Describes components and benefits of a SASE solution and how Palo Alto Networks
delivers a full-featured SASE solution with the combination and integration of Prisma Access,
Prisma SD-WAN, and cloud-delivered security services.
• SASE for Securing Internet: Design Guide—Presents a detailed discussion of the available design
considerations and options for Prisma Access and Prisma SD-WAN when used for securing access to
the internet.
• SASE for Securing Internet: Deployment Guide—Details deployment scenarios and step-by-step
guidance for the Securing Internet design. This design includes securing internet for mobile-users
and for remote-sites.
• SASE Secure Internet Policy Design: Solution Guide—Describes best-practice policy design and
deployment detail for securing internet services by using Cloud Managed Prisma Access.
• Securing SaaS with the Next-Generation CASB—Presents a detailed discussion of the available design
considerations and options for securing SaaS applications.
• Identity-Based and Posture-Based Security for SASE—Provides an overview of how the Palo Alto
Networks SASE platform obtains and uses identity and device-posture information. This guide also
provides design and deployment guidance for applying identity-based and posture-based policies
in a SASE environment.
Introduction
With the emergence of the hybrid workforce, the number of SaaS applications used in enterprises has
increased dramatically. Instead of purchasing applications and running them in their data centers,
organizations are increasingly subscribing to applications that external vendors host and maintain.
These SaaS applications, originally used for niche purposes, are now used for mission-critical business
functions, such as documentation, data storage, collaboration, payroll, human resources, customer
resource management, service tracking, and more.
Microsoft 365 is one of the most popular SaaS applications. It has wide adoption in enterprise, consumer,
and education spaces. It provides several tools and applications to its users for collaboration, productivity,
and security. The users of Microsoft 365 collaborate with each other in real-time by sharing documents,
conducting virtual meetings, and using messaging services. In addition, it is highly secure and meets
several compliance standards. Some of the popular applications are OneDrive, SharePoint, Teams, and
productivity applications such as Word, Excel, and Outlook.
SECURITY CHALLENGES
To secure Microsoft 365, you need to address certain areas, such as access control, data security, and
configuration management. You must manage the risk of not having control of the infrastructure or the
application itself. Users can access the applications from unmanaged devices, bypassing endpoint security
controls. Users can also access the applications from outside the corporate network, bypassing standard
inline protections and controls.
Some of the most common security challenges associated with Microsoft 365 include the following:
• Malware propagation—When Microsoft 365 SaaS users download an infected file to their
computers, the malware can infect other files shared by these users. Because of the automated file-
syncing capabilities between SaaS and endpoints, malware can easily propagate over your entire
organization.
• Advanced threat protection—Infected endpoints using Microsoft 365 applications increase risk to
your data in your Microsoft 365 tenants, from where they can become backdoor entrances into your
corporate tenants.
• Use of unsanctioned tenants—Your users might have access to other Microsoft 365 accounts, and
when they can upload documents from their other accounts, it creates a data-security risk.
• Securing unstructured data—Microsoft collaboration tools such as Microsoft Teams promote new
communication styles. To quickly convey ideas and information, employees are using shorter, more
frequent messages and sharing screenshots instead of traditional documents. As a result, sensitive
data can be unstructured and increasingly difficult to protect with legacy tools.
SECURITY FOUNDATION
CASB is the most recognized security solution for SaaS applications. It delivers visibility and security
controls across SaaS applications. Legacy CASBs are proxy-based standalone products, disjointed from
the security infrastructure. When deployed with other security controls, they can require complex traffic
redirection and introduce network complexity.
• Inadequate data protection—They provide inaccurate and limited coverage for data protection.
They discover sensitive data-at-rest via regular expressions (regex) and other traditional methods
that are prone to errors. They don’t offer a real-time mechanism to detect data in the context of
user conversations on collaboration applications.
• Poor security—Originally designed to be used as compliance tools, legacy CASB solutions offer
limited security controls compared to network security solutions. They deliver basic detection of
known malware and miss prevention of unknown and zero-day threats.
Prisma Access delivers protection at scale with global coverage. You do not have to worry about sizing and
deploying hardware firewalls at branches or building out and managing appliances in colocation facilities.
Prisma Access provides the network infrastructure to connect remote branches, headquarters sites, data
centers, and mobile users without requiring you to build new global security infrastructure and expand
operational capacity. Prisma Access is built in the cloud, leveraging the combined infrastructures of
Amazon Web Services (AWS) and Google Cloud, delivering the first security fabric that provides resilience
by using a multi-cloud architecture.
NG-CASB is a Prisma Access add-on that elevates the state of cloud-delivered SaaS security. With
complete visibility, real-time data protection, and best-in-class security, NG-CASB is the industry’s only
solution that automatically keeps pace with the explosive SaaS growth. In addition to the continuous trust
verification and security inspection provided by Prisma Access, the NG-CASB solution helps secure SaaS
application use in the following four ways:
• Visibility and control—Identify all SaaS applications in use, assess risk, and control access and
features.
• Advanced threat protection—Stop evasive malware inside SaaS applications and detect suspicious
user activities associated with compromised accounts and malicious insiders.
• Data security—Prevent exposure of sensitive data-in-motion to all SaaS applications and data-at-
rest inside sanctioned SaaS applications.
Design Details
This solution describes how NG-CASB allows you to gain visibility and control of Microsoft 365
applications, ensure data governance and compliance of stored data, and mitigate the risk of data leaks
and threat propagation.
• Explicit proxy—The mobile user’s web browser is configured to connect to the organization’s
Prisma Access explicit-proxy instance for HTTP or HTTPS access to internet-based SaaS
applications.
• GlobalProtect app—The mobile user has the GlobalProtect® app on their endpoint and connects
to the GlobalProtect portal in order to access the Prisma Access instance for internal, SaaS, and
internet applications.
This guide describes using all connection methods shown above for managed users and providing access
to internet-based applications. For more information about securing internet access with Prisma Access,
see the SASE for Securing Internet: Design Guide.
Prisma Access achieves visibility and control of Microsoft 365 traffic through the following:
• Enabling the default rules provided by Prisma Access to control Microsoft 365 applications
Note
As described later in this guide, design considerations for decryption differ for
Prisma Access security policy and web security policy.
• Using multiple policy objects in a security rule allows you to make the rule base more concise.
Policy objects represent a group of discrete identities that match specific traffic criteria like source,
destination, applications, services, and URL categories.
• Each security rule has an action that allows or denies the traffic that matches the list of policy
objects.
• For allowed traffic, security policy provides additional inspection and enforcement.
This guide discusses both traditional security policy (the interface is similar to PAN-OS® and may appeal
to network security administrators) and web-access security policy (the interface is more suitable to web-
security administrators).
For more information about traditional security policy, see the SASE Secure Internet Policy Design: Solution
Guide.
Web Security
• Consolidated policy management—From a single location, you can define URL and application
access policies for users and security protections. You apply threat-protection settings globally to
all web traffic, which eliminates the need to configure them on a per-policy basis. You can easily
manage SSL decryption from a central location.
• Built-in best practices—The ready-to-use default policy configurations adhere to Palo Alto
Networks best-practice recommendations. To secure web traffic right away, you simply enable Web
Security and push the configuration. You can use the default policies as-is or customize your own.
◦ Decryption for all web traffic—Decrypts all web traffic except that for which you define
exclusions
◦ Global web access—With all threat inspections enabled, allows all web traffic and blocks high-
risk applications and URL categories
You can review web-access security policies in the cloud-managed Prisma Access portion of Strata Cloud
Manager by selecting Manage > Web Security > Web Access Policy. The default tab contains the web-
access policies, and you use a second tab in order to review and deploy SaaS policy recommendations.
The following figure shows the default web-access policies in web security.
Web-access security policies are evaluated before any other security rule. As shown below, web-access
security policies are applied first, and then the other rules are evaluated.
Decryption
Prisma Access uses the SSL forward proxy default configuration to decrypt all outbound internet traffic
from all users. To secure the connection, SSL uses certificates to establish trust between the client and
server. Most commonly, to establish this trust, an organization uses its own public key infrastructure
to generate a trusted signing certificate for Prisma Access. The endpoints must install the Prisma
Access Root CA certificate into their certificate store so that the client session to Prisma Access can be
established. You can use GlobalProtect to install the Trusted Root CA certificate on Windows and macOS
clients. Alternatively, Prisma Access includes built-in signing certificates that you can use for testing.
Both options deliver the same objective, which is to secure Microsoft 365 traffic, but implementation
details for each of them differ. If you are a network security administrator who is familiar with network
security policy, then you should consider using traditional security policy. If you are a web administrator
who is familiar with configuring Web Security policies, then you should consider using Web Security.
Note that if you enable Web Security, then the rules defined via traditional security policy for web-based
traffic are not matched.
Using Traditional Security Policy for Visibility and Control of Microsoft 365
This design describes how you can use Prisma Access to achieve visibility and control for Microsoft 365
applications by using Prisma Access security rules.
Microsoft 365 traffic consists of many applications. Prisma Access has App-IDs to match this traffic and it
also has in-built application groups that group these App-IDs. This section presents Microsoft application
groups and their corresponding App-IDs. For instance, Table 2 shows the application group Microsoft-
365-Access and its corresponding App-IDs: office-365-consumer-access and office-enterprise-access.
App-IDs Description
ms-product-activation This App-ID matches traffic related to license validation procedure used by
Microsoft in all of its Windows operating systems.
App-IDs Description
Table 3 App-IDs for the Microsoft 365 Mail Clients application group
App-IDs Description
mapi-over-http This App-ID matches transport protocol used to connect Outlook and Exchange.
ms-exchange This App-ID matches traffic related to transfer and synchronize email/calendar
information between the server and the user’s client.
rpc-over-http This App-ID matches Microsoft protocol that is used to connect Microsoft Exchange
clients to access Microsoft Exchange servers over HTTP.
activesync This App-ID matches protocol that allows users synchronize their Exchange
mailbox with their mobile device.
App-IDs Description
ms-office365 This App-ID matches online office and software services related to Microsoft Office
365 suite.
ms-onedrive This App-ID matches traffic going from client to Microsoft OneDrive. There
are sub-applications that are part of ms-one-drive that are also matched, such
as ms-onedrive-sharing, ms-onedrive-uploading, ms-onedrive-base, and
ms-onedrive-downloading.
ms-onenote This App-ID matches application traffic related to Microsoft OneNote and
its sub-categories, such as ms-onenote-base, ms-onenote-uploading, and
ms-onenote-downloading.
ms-lync-base This App-ID matches instant messaging client’s traffic for Microsoft Lync and
Microsoft Communicator for Mac.
skype This App-ID is used to match real-time interactive application supported by skype.
App-IDs Description
http-audio This App-ID matches streaming audio used by many media players (e.g., QuickTime,
Windows Media Player, Win amp, Real Media), radio stations and other audio
applications.
http-video This App-ID matches streaming video used by many media players (e.g., QuickTime,
Windows Media Player, Win amp, Real Media) and other video applications.
ocsp This App-ID matches Online Certificate Status Protocol (OCSP). This protocol is used
for obtaining the revocation status of an X.509 digital certificate.
soap This App-ID matches SOAP protocol which is used for exchanging XML-based
messages.
ssl This App-ID matches Transport Layer Security (TLS) and its predecessors, SSL.
websocket This App-ID matches WebSocket which provides bi-directional communication over
a single TCP connection.
windows-azure-base This App-ID matches the traffic related to the Microsoft Azure service.
Table 6 App-IDs for the Microsoft Real Time Protocols application group
App-IDs Description
rtp Network protocol for delivering audio and video over IP networks
• Microsoft Product Activation—This rule matches Microsoft license activation traffic, and it uses
default settings provided by Prisma Access.
◦ The destination address in this list is Worldwide Any IPv4 and Worldwide Any IPv6 derived from
EDLs.
◦ The profile group used in this rule is best-practice-DLP which is a custom profile group, and it
contains data protection enabled. We have added data loss prevention (DLP) protection to this
rule because this rule matches files uploaded or downloaded to Microsoft 365 that may contain
sensitive traffic.
• Microsoft 365 Real Time—This rule matches real-time protocols like rtp and uses default settings.
• Microsoft 365 Catch All—This rule matches dependent applications like ssl and uses default settings.
In these security rules, Prisma Access uses external dynamic lists (EDLs) that are published in EDL
hosting service maintained by Palo Alto Networks. The EDL Hosting Service maintains a list of feed
URLs that contain software-as-a-service (SaaS) application endpoints. Each Feed URL contains an EDL
that is checked daily for any new endpoints added to the publicly available Feed URLs published by SaaS
endpoints, which in this case is Microsoft 365.
These rules are applied in a security policy as shown in the following table:
To ensure compatibility across all websites, Prisma Access includes both RSA and ECDSA signed
certificates. Two sets of certificates, one trusted certificate for trusted domains, and one untrusted
certificate for untrusted domains. The untrusted certificate ensures that the end user gets a browser error
when the target website has a certificate signed by a certificate authority that Prisma Access does not
trust.
Note
If decryption breaks an important website or application, you can add the hostname or use a wildcard
domain as a custom decryption exclusion. If for compliance regulation you want to prevent decryption for
a specific type of application (examples: financial services, government, health, and medicine), you can
configure a bypass based on URL categories. Prisma Access does not decrypt, inspect, and enforce security
policy on traffic that the SSL decryption exclusion list allows or the URL category that is bypassed.
Note
If you add a site to the exclusion list, confirm that the site hosts applications or
provides services that your business requires and document the justification.
The main reasons that websites and applications break when decryption is applied include pinned
certificates, client authentication, incomplete certificate chains, and unsupported ciphers. Pinned
certificates are commonly associated with mobile apps. To eliminate the need to maintain exclusions for
the most common websites and applications that cannot be decrypted, Prisma Access contains a list of
predefined exclusions. An example of exclusions is shown in the following figure.
When using Prisma Access decryption, you use a best-practice decryption profile to enforce the
recommended TLS versions, cipher suites, and certificate validations. The best-practice decryption
profiles enforce the following:
• Block sessions based on certificate status, including blocking sessions with expired certificates,
untrusted issuers, unknown certificate status, and restrict certificate extensions.
• Block sessions with unsupported versions and cipher suites and that require using client
authentication.
• Define the minimum protocol version and key exchange, encryption, and authentication algorithms
allowed.
Caution
The following figure shows how Prisma Access applies a best-practice decryption profile in order to
enforce the above-mentioned settings.
Note
By default, Prisma Access does not decrypt Microsoft 365 traffic. To support decryption, we recommend
you create a rule that decrypts Microsoft 365 traffic. In this design, we have created a rule called Decrypt
Catch All that decrypts all traffic, excluding rule one, and it also decrypts Microsoft 365 traffic.
As explained in the “Decryption” section, you should install Prisma Access certificates in endpoints.
However, Android devices don’t allow importing external certificates into their store. As a result, you
can’t decrypt Android devices. Due to the constraint imposed by Android devices, we recommend that you
disable decryption only for Android devices. Prisma Access supports this by identifying Android devices by
using Host Information Profiles (HIP) objects.
A HIP object might have a single attribute, such as host device operating system, or a combination of
attributes, such as hostname, host id, serial number, and many others. By default, Prisma Access supports
many HIP objects, as shown in the following figure.
You can group multiple HIP objects together in a HIP profile. For instance, you can create a HIP profile
that matches a specific Windows version, verify that an antivirus application is running, and verify disk
encryption.
The GlobalProtect app collects information about the device hosting it, and then the app submits this
information to the GlobalProtect gateway. The gateway matches the raw information submitted by
GlobalProtect against your HIP objects and HIP profiles. If it finds a match, it generates an entry in the
HIP Match log. If it finds an HIP profile match in a policy rule, it enforces the corresponding security
policy.
In this design, you create a HIP profile that consists of HIP objects that match for Android devices, and
you use that match in the decryption policy. When the decryption policy matches Android devices, it does
not decrypt the traffic.
Using Web-Access Security Policy for Visibility and Control of Microsoft 365
Web Security provides a simplified and consolidated management experience for administrators who’re
focused on securing access to the internet and Microsoft 365 applications.
To match Microsoft 365 traffic by using Web Security, you need to create a custom web-access security
policy for matching this traffic. This custom web-access security policy must match the applications
belonging to Microsoft 365. When deploying Web Security, web administrators need not worry about
App-IDs. Instead, they can apply applications in their rules. Prisma Access Web Security has a default
application group called Ms Office 365. This application group matches several applications belonging to
Microsoft 365.
Ms Lync Online Lync, which provides functions (such as messaging, voice, video, and meeting) to
users of Skype
Ms Teams Microsoft Teams, a platform that combines workplace chat, meetings, notes, and
attachments
Office On Demand Office on Demand, which allows users to use Microsoft 365 programs on machines
where Microsoft 365 is not installed
Outlook Web Online Outlook Web Online, which allows users to access their email, without using a local
mail application like Outlook
SharePoint SharePoint, a cloud-based service that allows you to create and manage websites
Note
For each of these applications, you can control which function within that
application you can allow. For instance, for SharePoint, you can enable sub-
functions like uploading/downloading to it.
To define security policies in Web Security, you need to define applications that you want to be matched
(as opposed to App-IDs). Configuring applications makes it easier for web administrators to define
security policies. When you define a security rule, shown below, and push it then the applications defined
are converted as App-IDs.
Source DLP
Policy name State location User Web applications Advanced settings protection
Microsoft Enabled Any Any Ms Office 365 Antispyware, vulnerability, protection, Yes
365 WildFire and malware protection.
In the above rule, you need to enable DLP protection, which is not part of the default protection. This rule
matches traffic coming from any location and applies advanced settings as shown above.
Tenant Restriction
Tenant restriction ensures that your users can connect only to your tenant rather than to their personal
Microsoft 365 tenants. You can configure tenant restriction in Web Security.
Web Security has centralized decryption settings that apply to all Web Security policies. The following
figure shows the Web Security default settings.
The key features of Web Security decryption policy are the following:
• To decrypt sessions, it uses the same certificates used by Prisma Access security policy.
• In the Bypass URL Categories pane, you define the websites that need to be excluded.
• In the Action Options pane, you can choose what action to take when Web Security can’t decrypt
traffic. We recommend that you leave the default option, which is to block the session.
The SSPM dashboard provides a summary view that allows you to quickly identify the most critical risks.
The dashboard provides information about the total number of failed policies by risk, applications with
the riskiest policy violations, high-risk policy violations, and applications with high-risk accounts.
The policy rules are already built-in. To reduce the alert noise and enable easy prioritization of settings
that require remediation, the results of the policies are grouped by security areas and applications.
Each policy provides details into how it maps to application-specific settings. Details for each application
include:
For each of the SaaS application-specific settings, detailed information, references, and remediation
instructions help you to quickly remediate the failed policies. To prevent configuration drift, SSPM
performs continuous monitoring for all settings across all apps. If the best-practice settings do not align
with your policies, you have the option of disabling monitoring for individual settings with application-
instance granularity.
As previously mentioned, Prisma Access Security Posture Management has in-built rules that it uses to
verify configuration of Microsoft 365. From the dashboard, you can verify the settings related to Microsoft
365, as shown in the following figure.
By selecting Microsoft 365, you can view all the recommendations listed by SSPM, which are shown below.
DATA SECURITY
With the industry’s first cloud-delivered DLP service, this solution provides data protection and
compliance controls consistently across SaaS applications. This solution delivers the following data-
security capabilities:
• Single cloud engine—This solution delivers unified policies for sensitive data everywhere, both at
rest and in transit.
• Highest levels of detection accuracy—This solution automatically detects sensitive content via ML
data classification and an extensive number of described data identifiers using regex or keywords
(examples: credit card or ID numbers, financial records, General Data Protection Regulation
(GDPR), or other data privacy and compliance-related information) and applies customizable data
profiles and Boolean logic to scan for collective types of data.
• Scanning, classification, and protection—This solution analyzes all data stored within SaaS
applications in order to make sure policy violations, exposures, and regulatory compliance are
properly addressed.
• Exposure analysis—To reduce incidents and inaccurate detection, this solution analyzes public,
external, and internal sharing of files, as well as precise context criteria (example: number of
occurrences and pattern logic).
• Exact data matching—An advanced data-fingerprinting method detects specific sensitive data and
prevents exfiltration.
• Secure collaboration applications—Ensuring high accuracy and fewer false positives, this solution
automatically identifies sensitive information even within the context of unstructured users’
conversations by using deep learning, natural language processing, artificial intelligence models,
and advanced optical character recognition (OCR).
To evaluate the content of data being sent to (data-in-motion) or stored (data-at-rest) in Microsoft 365,
the next-generation CASB solution uses Enterprise DLP. Enterprise DLP is a cloud-based service that is
natively integrated into existing security control points, including SaaS Security Inline (Prisma Access and
NGFW), SaaS Security API, and Prisma Cloud. It provides instantaneous protection for data by applying
consistent data-security policies at scale.
To avoid data loss and data theft, Enterprise DLP discovers, monitors, and protects your sensitive data.
The service detects sensitive data by using a combination of techniques that include regex, keywords, and
ML. The service applies customizable data profiles by using Boolean logic, which provides much more
granular data-matching options and accuracy than just using search patterns. The service contains 1000+
data patterns and 20+ data profiles, including profiles for GDPR, California Consumer Privacy Act (CCPA),
personally identifiable information (PII), and you can create your own.
Data security is an important aspect of SaaS security, one of the key outcomes of data security is to protect
sensitive data from being exposed. The design goals for SaaS data security are the following:
• Meet compliance with external standards such as GDPR, CCPA, Payment Card Industry Data Security
Standard, Health Insurance Portability and Accountability Act (HIPAA), and Sox agencies
4. Choose data profiles based on data patterns and matching logic that meet your requirements
5. Using the data profiles identified, create data-asset policies in order to secure data stored in
Microsoft 365
6. Apply data profiles identified in web-access policies in order to secure data uploads to Microsoft
365
Data Types
NG-CASB supports a wide variety of applications and the most used file types, such as .csv,. json, .txt,
.doc, .docx, .xls, and more. You should also evaluate the maximum supported file size. For SaaS Security
API support, see Support on SaaS Security API to understand different file types that SaaS Security API
supports for scanning. For SaaS Security Inline support, see What’s Supported with Enterprise DLP to
identify different file types supported.
Detection Methods
Sensitive data is often stored or transferred in assets such as files, images, databases, and other forms
where data is typically stored. To determine the presence of sensitive data, NG-CASB performs deep-
scanning techniques on these assets. To that end, NG-CASB uses detection methods such as data patterns,
exact data matching, and optical character recognition.
Data patterns can match API credentials, addresses from different countries, credit card numbers,
Tax IDs, and many other forms of information. To identify content, the data patterns use regex, ML
techniques, and proximity analysis. For instance, they use regex to identify addresses from different
countries and ML techniques to identify legal documents. NG-CASB has more than 1000+ pre-defined
data patterns that you could use individually or combined with other data patterns in order to create a
data profile that is then applied to a DLP policy. When the pre-defined data patterns do not provide the
required granularity, you can define custom data patterns that scan content based on regex and proximity
keywords.
The second detection method is exact data matching (EDM). This capability allows NG-CASB to match
exact data values for detection. With extremely high accuracy, EDM detects sensitive information (such as
passwords) and PII (such as social security numbers, medical record numbers, bank account numbers, and
credit card numbers) stored in a structured data source such as databases, directory servers, or structured
data files (.csv and. tsv). The key difference between EDM and data patterns is that the data patterns look
for sensitive information whereas EDM looks for specific information. To leverage EDM, you must create
an encrypted hash of the sensitive data and upload it to the DLP engine. After sensitive data is uploaded,
the DLP engine indexes the encrypted hash of uploaded EDM data sets. EDM capability supports certain
file types, and there are restrictions on the size of the files. For supported data set formats, see Supported
EDM Data Set Formats.
OCR is the last detection method. After you enable OCR, the DLP engine scans images (such as .jpg, .jpeg,
.png, .tif, and .tiff) that are embedded in container files (such as .pdf, .pptx or .docx). The DLP engine then
extracts text with sensitive information and applies data profiles.
Data Profiles
NG-CASB has built-in data profiles that include match criteria based on data patterns (such as credit
card or ID numbers, financial records, GDPR, or other data privacy-related and compliance-related
information), Boolean logic and match count. Both SaaS Security Inline and SaaS Security API use the data
profiles to protect data. You can use the profiles as-is, or you can create your own.
Securing Data-in-Motion
This section describes how you can secure Microsoft 365 applications by using traditional security policy
or Web Security. Both methods achieve the same objective, which is to secure Microsoft 365 traffic, but
they differ in implementation details. Traditional web administrators might prefer to use Web Security,
but network security professionals might prefer to use the Prisma Access Security Policy.
If you are using traditional Prisma Access security policy for applying data security, then you need to
apply data profile to a security rule defined in Prisma Access. As discussed in the “Visibility and Control”
section, Prisma Access supports four rules for matching Microsoft 365 traffic. Amongst the four rules, the
rule named Microsoft 365 matches assets uploaded or downloaded to Microsoft 365 applications. Hence, we
recommend you deploy data profile to a custom profile group and attach the profile group to the security
rule.
For instance, in this guide, the default profile group is best-practice. In this design, you therefore create
a new custom profile group called best-practice-DLP, which includes the data profile Match Credit Cards
Inline. You apply this profile group to the security rule Microsoft 365.
SaaS Security Inline secures data-in-motion, enabling content inspection for assets that are uploaded
to Microsoft 365 applications. The data profiles can be applied either to web-access security policy or to
Prisma Access rules. This section describes how you can apply a data profile to web-access policies. When
a user uploads an asset to any SaaS application, Prisma Access inspects the asset in-line by using the DLP
data profile assigned to a web-access security policy.
To enable DLP, you need to apply a data profile to the web-access security policy. In the example shown
below, the data profile Match Credit Cards Inline is applied, for inspecting files uploaded to Microsoft 365.
By applying this DLP policy, you scan your assets to see if there is any credit card information present in
them.
Securing Data-at-Rest
When using Microsoft 365 applications, users can upload files from their unmanaged devices, bypassing
inline protections. To protect data assets in Microsoft 365, NG-CASB continuously scans assets by
using pre-defined or custom data-asset policies. Data-asset policies detect and remediate any sensitive
information present in SaaS stored assets. The data-asset polices can not only generate alerts but also can
take auto-remediate actions. The following sequence describes how NG-CASB can quarantine a sensitive
file uploaded from an unmanaged device:
3. SaaS Security API sends the file to Enterprise DLP for content scanning and matching configured
data profiles.
4. SaaS Security API quarantines the file according to the configured data-asset policy.
5. Mobile or branch office users are prevented from accessing the quarantined file.
For scanning content and assessing risk, NG-CASB includes default data-asset policies profiles. The
data-asset policies match existing data profiles and define actions for notifications and incident creation.
Some of the built-in asset policies include the following:
• Intellectual Property—Scans files for RSA and AWS secret keys and confidential documents that are
at risk of being stored or shared in a way that could result in a loss of intellectual property.
• Financial Information—Scans for financial data including credit card numbers, credit card
magnetic stripe data, international bank account numbers, financial accounting, bank statements,
personal finance, invoices, and other financial documents. By default, SaaS Security API performs
strict checking on credit card numbers in order to reduce false positives.
• PII Compliance—Scans for PII data, such as U.S., Canadian, and international social security
numbers. It also scans for Tax IDs from the U.S., Australia, Canada, Germany, and the UK for both
the Unique Taxpayer Reference and National Insurance Number formats. For each type of personally
identifiable information for which SaaS Security API scans, you can specify the minimum number of
occurrences required to trigger a match. As the number of violations for a specific asset exceeds the
specified threshold, the severity of the risk increases.
• Sensitive Credentials—Scans for key words, phrases, or regex strings that match a specific pattern
or character combination. For example: imported-openssh-key or -----BEGIN RSA
You can also create custom data-asset policies by using built-in or custom data patterns and profiles. The
data-asset policies are DLP rules that can match cloud application, exposure, asset type, and data profile.
After you create a policy, when the data matches the policy, the action could be to create an incident or
take any of the following auto-remediation actions:
• Quarantine
• Change sharing
To monitor rules in email applications, SaaS administrators can create security-control policies. When
enabled, certain rules can cause data leakage to the outside world. For instance, if there are public email
folders in an application, then users in the same organization (or sometimes belonging to different
organizations) can access it. Having visibility into the existence of such folders reduces the risk of
exposure.
• Public Folders in Email—This policy checks whether there are public folders present in email.
• High Risk Email Forwarding Rules—This policy checks whether there are any rules that forward
emails to high-risk email groups.
• Administrative Access of End Users Inbox—This policy checks whether an email administrator has
access to end-user email boxes.
Microsoft 365 applications introduce new risks that you need to understand and control. To help mitigate
the risks from advanced threats, NG-CASB provides the following capabilities:
• Protection from malware—Microsoft 365 applications automatically synchronize files with users
and third parties, so malware can also spread across the organization. This solution prevents
infected files from residing in Microsoft 365 application, whether the malware is known or
unknown and regardless of the source of the file. This solution stops the threat at the source before
the threat propagates to other locations.
• Behavioral analytics—This solution identifies high-risk activities such as shared credentials, bulk
data access, suspicious logins, impossible traveler, and more.
• User activity auditing—This solution enables quick and simple investigation and remediation
workflows.
1. Configure internal domains, which are used by SaaS Security API, to identify the exposure level
of shared assets.
3. Using an administrator account, onboard applications for SaaS Security API and SSPM
5. Explore discovered and quarantined assets, exposure levels, file types, and user and application
ownership.
SaaS Security API is a cloud service that connects directly to Microsoft 365 by using its API. This
connection provides visibility and control over the data and activities within the application. Deploying
SaaS Security API does not require deploying hardware or software on the network or endpoints. Traffic
doesn’t need to be steered to SaaS Security API through agents or proxy PAC file deployments. In fact, all
endpoints are supported, including mobile devices and personal and partner endpoints. Because there is
no added latency in using the Microsoft 365 application, the user experience of using it is unchanged.
SaaS Security API is available globally and can manage multiple SaaS applications, providing consistent
visibility and control across each. Within the managed SaaS application, SaaS Security API visibility and
control even extend to data and activities that originate on personal devices and collaborators who aren’t
part of your organization.
SaaS Security API connects and maintains a connection to Microsoft 365 without storing the
administrator password. However, to configure SaaS Security API to connect, you need an administrator
account in the Microsoft 365 application. When you add Microsoft 365 application to SaaS Security API,
you are asked to log in to the Microsoft 365 application as an administrator. SaaS Security API does not
store the login information. Instead, the administrator account is used to grant an OAuth token to SaaS
Security API, which stores the token and uses it to access the application.
Assets are the content stored in each cloud application. To help you uncover accidental or malicious data
exposure, SaaS Security API provides visibility into the asset inventory. SaaS Security API discovers
the assets stored in the cloud application, assesses the shared or exposed data within and outside your
organization, and identifies the impact or risk to intellectual property and regulatory non-compliance.
In addition to creating an incident and alerting the administrator, the service provides auto-remediation
capabilities, including the option to quarantine, change sharing, or notify the owner.
After connecting to Microsoft 365, to discover all assets inside the SaaS application, you must initiate
a retroactive scan. After the initial scan, SaaS Security API continuously monitors the application and
applies policy against new or modified assets (changes in permissions, location, owners, collaborators,
etc.). If you modify your policies, the new policies apply only to new assets and activities in the
application. To apply new policies to historical data, you must re-authenticate the application.
Giving priority to new assets and activities, the SaaS Security API policy engine evaluates the files and
metadata against the rules and displays the results on the dashboard. Depending on the amount of data
stored in the SaaS application, the scan of historical data and activities might take a while. All discovered
assets are shown in the SaaS Security API data assets screen.
To find specific assets, you can use the search bar to search by asset name or owner. To identify assets
with common attributes, you can use filters to narrow down the scope of the results. The following filter
criteria is available to search for assets:
• Creators
• Application instance
• Exposure
• Policy
• Data profile
The detailed view of the asset summarizes file name, type, exposure, owner, and last updated. Additional
detailed information on exposure, incidents, and user activity can help you monitor and investigate user
activity.
SaaS Security API defines a collaborator as any person who can access, view, preview, download, comment,
or edit a managed asset. SaaS Security API uses the defined internal domains to determine whether the
collaborators on an asset are internal to your organization or if the owner has shared the asset with
external users. SaaS Security API determines this by matching the domain name in each collaborator’s
email address against a defined list of internal domains. You also can configure external users and
domains as trusted, which helps distinguish business partners, contractors, and other third parties who
should be treated differently from generic external users.
Note
Because SaaS Security API uses the internal domains list in order to determine
the exposure level of an asset during the scan process, you must define the
internal domains list before scanning cloud applications.
Gaining visibility into how data is shared allows you to identify data that has been shared publicly, with
the wrong person, or with someone who should no longer have access. Additionally, when you do identify
an issue with sharing, SaaS Security API allows you to look back and see who accessed the data and when.
The exposure level describes how an asset is shared. SaaS Security API uses the following exposure levels
to classify scanned assets:
• Public—SaaS Security API considers an asset public if the repository is public or if the owner created
a public link, vanity URL, or password-protected link for direct access to the asset.
• External—The owner invited one or more users outside the organization to collaborate on the asset.
These are domains that are not configured as internal domains.
• Company—The owner created an organization-wide URL that gives anyone in the organization
direct access to the asset.
• Internal—This exposure level includes assets the owner has not shared. Also, it includes assets
that the owner has shared but only with specific users within the organization. These users have an
email address in the enterprise domain name.
Malware Detection
SaaS Security API uses WildFire to detect both known and unknown malware stored in Microsoft 365. SaaS
Security API scans assets and submits files to WildFire for analysis.
Note
SaaS Security API does not submit any files for processing by default, and you
control which file type categories apply to the WildFire service.
SaaS Security API uses a combination of tools, including ML, predefined and user-defined data patterns,
security configuration controls, and access to event logs auditing user access and activity on each cloud
application. With these tools, it builds context on sensitive data within your environment, identifies
thresholds for expected and unexpected behavior, and uses this intelligence to log a violation or alert you
to risky user behavior and possible data leaks from accidental or malicious user activity.
SaaS Security API offers built-in user-activity policies like the following:
• Risky IP—Detects user activities from IP addresses that are deemed to be malicious. These IP
addresses are determined by threat intelligence from Palo Alto Networks and reputable third-party
feeds. IP addresses include Tor exit nodes and IP addresses from Bulletproof hosting providers.
These services can host and distribute malicious, illegal, and unethical material.
• Bulk Upload—Detects users who are uploading large numbers of files or folders within a short
timeframe, likely indicating malicious intent to compromise your organization’s sensitive data.
• Impossible Traveler—Detects a user accessing an application from two different physical locations
within a timeframe that would be impossible for the user to physically travel.
The following figure shows the pre-defined user-activity policies in SaaS Security API.
To show the top events for user-activity policies, the SaaS Security API dashboard presents data analytics
of suspicious user-activities.
Using the above information, you can drill down on any of them to find out which users have triggered the
policies.
Deployment Details
This section covers the deployment details for securing Microsoft 365 applications. Many procedures are
examples, and you should adapt them to meet your specific requirements. As previously described, you
have two choices for implementing security policy:
If you are a network-security professional, then you might choose to follow Prisma Access security rules.
In contrast, if you are a web-security professional or if you are deploying Microsoft 365 security for the
first time, then you might deploy web security.
Prisma Access supports default profiles that ensure a straightforward deployment of security for
Microsoft 365. For conciseness, this guide does not repeat the default profiles that are built into Prisma
Access. Instead, this guide describes procedures that you need to deploy in order to support the above-
mentioned use cases. We encourage you to read the “Security Profiles” section in the SASE Secure Internet
Policy Design: Solution Guide.
As part of creating the example policies and recommendations, we tested the following SaaS application
clients:
◦ Teams
Procedures
1.8 Apply the Custom Security Group to the Security Policy Rules
Prisma Access provides predefined best-practice security profile rules. These best-practice rules are
already built-in to security policy rules and use the strictest security settings recommended by Palo
Alto Networks. For some profile types, you might see rules in addition to the best practice rules. You can
optionally use these basic settings to, for example, scan applications that are not business-critical or that
you allow for personal use, while continuing to use the strict best-practice rules to enforce your most
sensitive enterprise applications.
Caution
The policies shown in this guide are examples. Each client and operating
system have unique behavior, and the examples shown in this guide might
not support all client implementations. We highly recommend that before
implementing the policies in a production environment, you test these policies
with the clients you plan to support.
Strata Cloud Manager provides a single management pane that combines both Prisma Access and Prisma
SD-WAN tasks. In Cloud Manager, you use the left panel to navigate to specific Prisma Access and Prisma
SD-WAN functions. If the left panel is collapsed, to see the text labels that describe each function, you can
expand it by clicking the chevron at the bottom of the left panel.
For effective navigation within Cloud Manager, familiarize yourself with the icons. You access initial setup
tasks using Workflows functions. After the initial setup is complete, you access most operational tasks by
using Manage functions.
Step 2: Familiarize yourself with Cloud Manager, and then click Workflows. The left panel collapses.
When using Manage functions for Prisma Access, Cloud Manager uses inheritance to maintain certain
configuration parameters. Settings you make at a higher level configuration scope (Prisma Access), are
also available as read-only within lower level scopes (example: GlobalProtect and Service Connections).
Each time you start a session with Cloud Manager, your configuration scope is set to the scope selected in
the previous session. If you choose a different configuration scope, Cloud Manager maintains this choice
across all configuration screens that rely on a configuration scope. To simplify access to the configuration
scope pane, you can pin it and make it persistent. All following procedures in this guide assume that you
have pinned the configuration scope pane.
By default, Cloud Manager uses the Folders tab, which allows you to select configuration scopes for
Prisma Access. For all procedures, this guide assumes you choose scopes from the Folders tab. You do not
use the Snippets tab in this guide.
Step 3: Continuing in Cloud Manager, click Manage > Configuration > NGFW and Prisma Access. The
Overview pane appears.
Step 4: To pin the Configuration Scope pane to the left, click in the Configuration Scope box, and then
click the thumbtack. The Configuration Scope now remains visible in this position for all configuration
screens.
When you are logging into Prisma Access for the first time, the Microsoft 365 rules are disabled. This
procedure shows how to enable the default settings in each of the rules.
Src Dst
Name Zone Zone Application group Service Action Profile Group
Microsoft 365 trust any Microsoft 365 Access Application-default Allow best-
practice-
Microsoft 365 Mail Clients DLP
Microsoft 365 Services
Microsoft 365 trust any Microsoft Real Time Application-default Allow best-practice
Real Time Protocols
Microsoft 365 trust any Microsoft 365 - Dependent Application-default Allow best-practice
Catch All Apps
Step 1: Log in to Cloud Manager, and then navigate to Manage > Configuration > NGFW and Prisma
Access > Security Services > Security Policy.
Step 3: In the Security Policy Rules pane, under Prisma Access - Pre Rules, enable the four rules
pertaining to Microsoft 365.
Step 1: Navigate to Manage > Configuration > NGFW and Prisma Access > Objects > HIP > HIP Profiles.
Step 1: Navigate to Manage > Configuration > NGFW and Prisma Access > Security Services > Decryption.
Step 5: In the Source pane, under Devices, click Add HIP Profiles.
To successfully decrypt iOS devices, you should install the following certificates in the iOS devices:
• Forward-Trust-CA.
• Forward-Trust-CA-ECDSA.
Step 1: Navigate to Manage > Configuration > NGFW and Prisma Access > Security Services > Decryption.
Step 5: Install the above certificates on the iOS devices you want to connect to your sanctioned Microsoft
365 application.
Now you create a DLP profile that matches credit card data. A DLP profile contains data patterns that
match sensitive information such as credit card, social security, driver license, and other forms of
personally identifiable information.
Step 3: On the Add a Data Profile dialog box, click With Data Patterns only.
Step 4: In the Primary Rule pane, click Add Data Pattern group.
Step 5: In the Data Profile Name box, enter Match Credit Cards Inline.
Step 6: In the Data Pattern Conditions pane, in the Data Pattern list, choose Credit Card Number, and
then click Save.
Now you create a security profile group called best-practice-DLP. A security profile group combines all
security profiles that you have created or that are available by default. The security profile group allows
you to add all security profiles to a security rule by referencing a single object.
Step 1: Navigate to Manage > Configuration > NGFW and Prisma Access > Security Services > Profile
Groups.
Step 11: In the Data Loss Prevention Profile list, choose Match Credit Cards Inline, and then click Save.
1.8 Apply the Custom Security Group to the Security Policy Rules
Now you deploy the custom security group best-practice-DLP to the security rule Microsoft 365.
Step 1: Navigate to Manage > Configuration > NGFW and Prisma Access > Security Services > Security
Policy.
Step 4: In the Actions and Advanced Inspection pane, in the Profile Group list, choose best-practice-DLP,
and click Save.
Step 4: On the Example page, in the Basic Information pane, note your tenant ID.
Next, you configure tenant restrictions for your users. Tenant restrictions limit login access to a specific
Microsoft 365 enterprise instance and block access to all other Microsoft 365 enterprise and consumer
accounts.
Step 1: Navigate to Manage > Configuration > NGFW and Prisma Access > Objects > SaaS App
Management.
Step 4: On the Tenant Restrictions tab, next to Domains, verify that the following list of domains for
accessing Microsoft 365 is pre-populated.
Step 7: In the Tenant Directory ID box, enter your tenant ID, and then click Save.
Note
The previous procedure shows you how to find your tenant ID.
Step 8: On the top right of the Tenant Restrictions page, click Assign to Security Rules.
Step 9: Under Security Rules, select Microsoft 365 and Microsoft 365 Real Time, and then click Update.
Step 10: Navigate to Manage > Configuration > NGFW and Prisma Access > Security Services, and then
click rule Microsoft 365.
In the URL Category/Tenant Restrictions pane, you should see that tenant restriction is enabled.
Step 1: On the SaaS Application Management page, click Push Config, and then click Push.
Step 2: On the Push Config dialog box, in the Description box, enter a description.
Step 3: Select GlobalProtect and Remote Networks, and then click Push.
Note
For this and subsequent procedures, if you are deploying only mobile users or
remote networks, you push the configuration for the connection types in use.
Step 4: On the Jobs dialog box, when the push job result changes to OK, click Done.
Step 5: Navigate to Manage > Configuration > NGFW and Prisma Access > Overview.
Step 6: In the Configuration Scope pane, select Prisma Access, and then in the Config Status pane, watch
for the configuration status to change back to In Sync. This indicates that the configuration push has
completed.
Procedures
Decryption policies determine which traffic gets decrypted and which is not. By default, Prisma Access
decrypts any traffic when its URL category is part of groups such as financial-services, government,
health-medicine, and shopping. Similarly, the best-practices recommend you decrypt when the URL
categories are part of groups such as parked, questionable, unknown, web-based-email, and webhosting.
In these procedures, you use Web Security to enable decryption for Microsoft traffic originating from
Windows, macOS, and iOS devices. You disable decryption for Android devices.
Web Security management integrates with SaaS Security Inline in order to deploy policy
recommendations.
Step 1: In Cloud Manager, navigate to Manage > Configuration > NGFW and Prisma Access > Overview. In
the Configuration scope pane, select Global Protect.
Step 5: In the Push Config dialog box, in the Description box, enter a description, select Prisma Access,
and then click Push.
Step 6: If you want to enable Web Security for Explicit Proxy, navigate to Manage > Configuration >
NGFW > Prisma Access > Overview, and then in the Configuration Scope pane, select Explicit Proxy and
repeat Step 2 to Step 5.
Step 7: If you want to enable Web Security for Remote Networks, navigate to Manage > Configuration >
NGFW > Prisma Access > Overview, and then in the Configuration Scope pane, select Remote Networks
and repeat Step 2 to Step 5.
In this procedure, you use Web Security in order to configure a security rule for Microsoft 365
applications.
Step 1: Navigate to Manage > Configuration > NGFW and Prisma Access > Security Services > Web
Security.
Step 2: In the Custom Web Access Policies pane, click Add Policy.
Step 4: In the Allowed Web Application pane, click Add > Add Application.
There are many applications that are part of the default rule Ms Office365. If you want to select only a
particular application, for instance SharePoint uploading, then execute the next step.
Step 6: In the Allowed Web Application pane, in the App Functions list, unselect Allow All App Functions,
and select option SharePoint Online Uploading, and then click Save.
Step 1: Navigate to Manage > Configuration > NGFW and Prisma Access > Security Services > Web
Security.
Step 2: In the Custom Web Access Policies pane, click Microsoft 365.
Step 3: In the Allowed Web Applications pane, on the Ms Office365 rule, in the DLP list, choose Match
Credit Cards Inline, and then click Save.
In the navigation pane on the left, in the admin centers, click Azure Active Directory.
Step 3: On the Example page, in the Basic Information pane, note your tenant ID.
In this example procedure, you configure tenant restrictions using Web Security.
Step 1: Navigate to Manage > Configuration > NGFW and Prisma Access > Objects > SaaS App
Management.
Step 4: On the Tenant Restrictions tab, in the Domains pane, verify that the following list of domains for
accessing Microsoft 365 are already pre-populated.
Step 5: On the Tenant Restrictions tab, in the Permitted Tenant List pane, click the + button.
Step 7: On the Tenant Restrictions tab, in the Tenant Directory ID dialog box, enter your tenant ID.
Note
The next procedure shows you how to find your tenant ID.
Step 2: On the Push Config dialog box, select Prisma Access, and then click Push.
Step 3: In the Jobs dialog box, when the push job result changes to OK, click Done.
Step 4: Navigate to Manage > Configuration > NGFW and Prisma Access > Overview.
Step 5: In the Configuration Scope pane, select Prisma Access, and then in the Config Status pane, watch
for the config status to change back to In Sync. This indicates that the configuration push has completed.
Procedures
SaaS Security API is a cloud service that connects directly to Microsoft 365 by using its API. This
connection provides visibility and control over the data and activities within the application. When
you enable SaaS Security API it discovers assets stored in Microsoft 365, scans, and analyses the risks
associated with them based on default or custom data-asset policies. In addition, SaaS Security API
detects any user activity anomalies. This procedure group shows how to configure SaaS Security API to
secure Microsoft 365.
By onboarding Microsoft 365 applications, Prisma SaaS can perform inspection on the assets uploaded to
Microsoft 365 applications.
Step 2: On the Settings tab, in the Configure pane, select Apps Onboarding.
Step 5: Add Microsoft administrator credentials and complete the onboarding process.
Step 8: After you have completed onboarding Office 365, verify that both instances of Office 365 are
running. You can do that by navigating to Manage > Configuration > SaaS Security > Settings and in the
Configure pane, select Apps Onboarding. Here, you click Office 365 and verify that both instances are
running.
Now you configure the internal domain to be example.com. Configuring internal domains allows you to
identify data assets that are internal and external to your organization. You configure internal domains in
SaaS Security API.
Step 1: Continuing in the Cloud Manager, navigate to Manage > Configuration > SaaS Security > Settings,
and in the Configure pane, select Manage Domains.
Step 3: In the Edit Internal Domains dialog box, enter example.com, and then click Save.
You configure a data-asset policy Alert on HIPPA Violations. Data-asset policies detect whether there is
sensitive data present in SaaS applications. To detect sensitive data, SaaS Security API provides default
policies. In addition to the default policies, SaaS Security API allows you to create custom policies.
In this procedure, you create a custom data-asset policy. This policy is a medium-severity policy, and
it alerts an administrator and logs an incident when HIPPA violation occurs on Microsoft 365 SaaS
application.
Note
Step 1: Navigate to Manage > Configuration > SaaS Security > Data Security > Policies.
Step 3: In the General pane, in the Policy Name box, enter Alert on HIPAA Violations.
Step 4: In the Description box, enter Alert on HIPAA Violations Data Asset Policy.
Step 9: In the Select Cloud App list, select Office 365 Example.
Step 13: In the Action pane, select Log as an incident only, and then click Create.
In this procedure, you create a custom user-activity policy Uploads to Microsoft 365. This policy matches
uploads to Microsoft 365 application, and it flags an alert when a user uploads more than 50 times a day.
User-activity policies highlight any suspicious activities in SaaS applications. Such activities include risky
IP addresses, bulk uploads, bulk downloads, and more. SaaS Security API has in-built policies to detect
such activities and has options for you to create custom policies. The custom policies allow you to match
granular conditions to define specific user behaviors.
Step 1: Navigate to Manage > Configuration > SaaS Security > Data Security > Policies.
Step 3: In the General pane, in the Policy Name box, enter Uploads to Microsoft 365.
Step 4: In the Description box, enter Uploads to Microsoft 365 Activity Policy.
Step 8: In the Match Criteria pane, in the Sanctioned Applications list, select Office 365 Example.
Step 9: In the User Activity list, select Upload, and then click Create.
Summary
The Palo Alto Networks next-generation CASB solution elevates the state of cloud-delivered SaaS security.
With complete visibility, real-time data protection, and best-in-class security, it’s the industry’s only
solution that automatically keeps pace with the explosive SaaS growth. In addition to the continuous
trust verification and security inspection provided by Prisma Access, the NG-CASB add-on helps secure
Microsoft 365 application in the following four ways:
• Advanced threat protection—Stop evasive malware inside Microsoft 365 applications and detect
suspicious user activities associated with compromised accounts and malicious insiders.
The NG-CASB design uses cloud-managed Prisma Access in order to provide the following set of
capabilities, which are all integrated into a single management console:
• SaaS Security Inline—SaaS Security Inline uses ACE to retrieve Microsoft 365 application
information and enforce access controls. ACE contains over 55,000 SaaS application IDs and is
adding to the list constantly. To identify new SaaS applications as they become available, ACE uses
ML and crowdsourcing.
• SaaS Security API—Cloud-based service that connects directly to Microsoft 365 applications by
using the cloud application’s API. The service provides asset discovery, data classification, sharing/
permission visibility, user-activity monitoring, and threat detection.
• SSPM—Cloud-based service that connects directly to Microsoft 365 applications by using the
cloud application’s API. Through continuous monitoring, the service helps detect and remediate
misconfigured security settings and best practices in SaaS applications.
© 2023 Palo Alto Networks, Inc. Palo Alto Networks is a registered trademark of Palo Alto Networks. A list of
our trademarks can be found at https://www.paloaltonetworks.com/company/trademarks.html. All other marks
mentioned herein may be trademarks of their respective companies. Palo Alto Networks reserves the right to change,
modify, transfer, or otherwise revise this publication without notice.
B-002173P-1-23b