Enable Cloud Access Security Broker Features for Microsoft 365 Tenants
Umbrella supports two Cloud Access Security Broker (CASB) features for Microsoft 365:
- Cloud Malware protection for OneDrive, SharePoint Online, and Outlook sites within your Microsoft 365 deployment.
Note on running both Microsoft 365 and Cloud Malware: Microsoft 365 and Cloud Malware both protect users against malware. However, their functionalities are not redundant. Microsoft 365 might discover malware that Cloud Malware does not find. Cloud Malware also finds malware that Microsoft 365 overlooks. There is value to running Microsoft 365 and Cloud Malware simultaneously.
- CASB detection of third-party cloud applications that have been authorized to access a sanctioned Microsoft 365 tenant. You can see information about these third-party applications using the Third-Party Apps Report .
You can enable CASB features for authorized tenants that use the following Microsoft 365 applications:
- Sharepoint Online
- OneDrive
- Outlook (For Cloud Malware protection only and for the primary inbox only. For outgoing mail you can enable Data Loss Prevention; see Enable SaaS API Data Loss Protection for Microsoft 365 Tenants.)
Note: You cannot add an application to an existing tenant. If you have an existing Microsoft 365 tenant that uses one or two of these applications and you wish to add another application to that tenant, you must first revoke authorization for the existing tenant, then create a new tenant using all the desired applications.
Table of Contents
Prerequisites
- A minimum user role of Full Admin. For more information, see Manage User Roles.
- Chrome or Firefox (recommended) with pop-up blockers and ad blockers disabled (only for the duration of authorization).
- The user performing the installation must use a service account with a Microsoft 365 Global Admin and active license.
- Audit log must be enabled for Microsoft 365. For more information, refer to Microsoft Technical documentation and search for Turn auditing on or off.
- SharePoint Online and OneDrive must be enabled for the organization.
- The following IP addresses must be allowed if there are Firewall rules that prevent third-party applications:
146.112.161.0/24
146.112.163.0/24
146.112.165.0/24
146.112.167.0/24 - If you use Conditional Access Policy (CAP) to restrict access to your Microsoft 365 tenant, you must grant the above Umbrella IP addresses access in the CAP. You must also grant your current egress IP access in the CAP. These IP addresses are cached by Microsoft and used as part of the conditional access checks.
- Users must have the following API permissions for Microsoft:
API/ Permissions Name | Type | Description | Admin Consent Required |
---|---|---|---|
Microsoft Graph | |||
| Delegated | Access directory as the signed-in user | Yes |
| Application | Read directory data | Yes |
| Delegated | Read all files that user can access | No |
| Application | Read files in all site collections | Yes |
| Delegated | Read items in all site collections | No |
| Delegated | Sign in and read user profile | No |
| Application | Read all users' full profiles | Yes |
Microsoft 365 Management APIs | |||
| Application | Read activity data for the Organization | Yes |
SharePoint | |||
| Application | Full control of all site collections | Yes |
| Application | Read user profiles | Yes |
Limitations
- A tenant that fails to authenticate cannot be deleted.
- Umbrella Cloud Malware attempts to quarantine a file will fail if that file has been locked by Microsoft 365. This may occur if Microsoft 365 Advanced Threat Protection (ATP) has detected malware in the file. In such a case, the lock placed by ATP take precedence over Umbrella's ability to detect or remediate DLP violations in malware.
Authorize a Tenant
- Navigate to Admin > Authentication.
- In the Platforms section, click Microsoft 365.
- Click Authorize New Tenant in the Cloud Access Security Broker subsection to add a new Microsoft 365 tenant to your Umbrella environment.
- In the Microsoft 365 Authorization dialog, check the checkboxes to verify you meet the prerequisites and then click Next.
- Add a Tenant Name and then click Next.
- Select one or both Cloud Access Security Broker (CASB) features to authenticate: Cloud Malware and Third-Party Apps.
![]()
If you choose to authorize for Cloud Malware protection, you must also select a Response Action for Umbrella to apply to Microsoft 365 files found with malware.
- Choose Monitor to cause Umbrella to log files detected with malware. You will be able to manually quarantine these files from the Cloud Malware report.
- Choose Quarantine to:
- Move the file into a folder named Cisco_Quarantine_Malware in the root path of the admin who authorized the tenant, remove all collaborators, and change the file owner to the Microsoft 365 admin.
- Replace the file in its original location with a text file named filename.ppt_Cisco_Quarantined.txt explaining to the original file owner that the file is identified as malware and for more information to contact their organization administrator.
Note: If you choose Quarantine this will apply only to rules applied to Sharepoint and OneDrive; Umbrella Cloud Malware supports monitoring Outlook messages in the primary inbox, but cannot quarantine them.
For more information on Cloud Malware monitoring and quarantine features, see Manage Cloud Malware Protection. For more information on Third-Party Apps detection features, see Third-Party Apps Report.
After making your selections, click Next.
- At the Integration step, click Next.
![]()
You are redirected to the Microsoft 365 login page.
- Log in to Microsoft 365 with admin credentials to grant access.
![]()
You are redirected to Umbrella and a message appears showing the integration was successful. It may be up to 24 hours for the integration to be confirmed and appear as Authorized.
- Click Done.

Edit a Tenant
You can change the protection type or Response Action you have selected for a tenant.
- Navigate to Admin > Authentication.
- In the Platforms section, click Microsoft 365.
- In the Cloud Access Security Broker subsection , from the Edit column, click Edit. You can edit any tenant.
-
Choose to authorize your Microsoft 365 tenant for Cloud Malware protection, or detection of third-party cloud applications, or both.
If you choose to authorize for Cloud Malware protection, you must also select a Response Action for Umbrella to apply to Microsoft 365 files found with malware.
- Choose Monitor to cause Umbrella to log files detected with malware. You will be able to manually quarantine these files from the Cloud Malware report.
- Choose Quarantine to:
- Move the file into a folder named Cisco_Quarantine_Malware in the root path of the admin who authorized the tenant, remove all collaborators, and change the file owner to the Microsoft 365 admin.
- Replace the file in its original location with a text file named filename.ppt_Cisco_Quarantined.txt explaining to the original file owner that the file is identified as malware and for more information to contact their organization administrator.
- Click Next.

The new Response Action is displayed.
![]()
Note: For tenants authorized only for CASB detection of third-party cloud applications, no Response Action is shown.
Revoke Authorization
- For Action, click Revoke. You can revoke any authorized tenant.
- Click Revoke. The selected account is no longer authorized.

Enable Cloud Cloud Access Security Broker Features for Google Drive Tenants < Enable Cloud Access Security Broker Features for Microsoft 365 Tenants > Enable Cloud Malware Protection for ServiceNow Tenants
Updated 12 days ago