SC-300 Exam QuestionsBrowse all questions from this exam

SC-300 Exam - Question 249


Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have an Amazon Web Services (AWS) account, a Google Workspace subscription, and a GitHub account.

You deploy an Azure subscription and enable Microsoft 365 Defender.

You need to ensure that you can monitor OAuth authentication requests by using Microsoft Defender for Cloud Apps.

Solution: From the Microsoft 365 Defender portal, you add the Microsoft Azure app connector.

Does this meet the goal?

Show Answer
Correct Answer: B

To monitor OAuth authentication requests using Microsoft Defender for Cloud Apps, you need to connect the relevant cloud service through an app connector. Adding only the Microsoft Azure app connector does not suffice because it only allows monitoring Azure-specific activities. Instead, to monitor OAuth authentication requests for a more comprehensive range of services, including third-party ones like Google Workspace, you need to ensure those services are connected separately. Only then will you have the necessary visibility and control over OAuth requests across your systems.

Discussion

7 comments
Sign in to comment
penatunaOption: B
Mar 6, 2024

OAuth app management is available only after connecting one or more of the supported platforms - Microsoft 365, Google Workspace, or Salesforce. Once connected, the OAuth apps menu option will appear under Investigate. App Governance is a set of security and policy management capabilities designed for OAuth-enabled apps registered on Azure Active Directory (Azure AD), Google, and Salesforce. For more information, see App governance add-on to Defender for Cloud Apps in Microsoft 365 Defender.

penatuna
Mar 6, 2024

The Microsoft Defender for Cloud Apps app permissions enable you to see which user-installed OAuth applications have access to Microsoft 365 data, Google Workspace data, and Salesforce data. Defender for Cloud Apps tells you what permissions the apps have and which users granted these apps access to their Microsoft 365, Google Workspace, and Salesforce accounts. App permissions help you decide which apps you allow your users to access and which ones you want to ban. https://learn.microsoft.com/en-us/defender-cloud-apps/manage-app-permissions

penatuna
Mar 6, 2024

Many third-party productivity apps that might be installed by business users in your organization request permission to access user information and data and sign in on behalf of the user in other cloud apps, such as Microsoft 365, Google Workspace and Salesforce. When users install these apps, they often click accept without closely reviewing the details in the prompt, including granting permissions to the app. This problem is compounded by the fact that IT may not have enough insight to weigh the security risk of an application against the productivity benefit that it provides. Because accepting third-party app permissions is a potential security risk to your organization, monitoring the app permissions your users' grant gives you the necessary visibility and control to protect your users and your applications.

penatuna
Mar 6, 2024

The Microsoft Defender for Cloud Apps app permissions enable you to see which user-installed OAuth applications have access to Microsoft 365 data, Google Workspace data, and Salesforce data. Defender for Cloud Apps tells you what permissions the apps have and which users granted these apps access to their Microsoft 365, Google Workspace, and Salesforce accounts. App permissions help you decide which apps you allow your users to access and which ones you want to ban. https://learn.microsoft.com/en-us/defender-cloud-apps/manage-app-permissions

ACSCOption: B
Oct 4, 2023

https://learn.microsoft.com/en-us/defender-cloud-apps/manage-app-permissions

cgonITOption: B
Oct 12, 2023

Correct Answer. B, No. The way to manage those third party apps is through the Microsoft Defender for Cloud Apps -> App Connector. If not, there is no way to detect and investigate them. https://learn.microsoft.com/en-us/defender-cloud-apps/manage-app-permissions

KRISTINMERIEANNOption: B
Apr 10, 2024

https://learn.microsoft.com/en-us/defender-cloud-apps/manage-app-permissions

Justin0020
Apr 15, 2024

There are multiple instances of this question, the only right answer seems to be the Google Workspace connector: https://learn.microsoft.com/en-us/defender-cloud-apps/protect-google-workspace Only guide who speaks about OAuth.

jim85
Jul 3, 2024

Your are the boss, saving a lot of time figuring this out, thx!

rikicmOption: A
Oct 11, 2023

Microsoft Entra admin center

Obi_Wan_JacobyOption: B
Apr 18, 2025

Answer B: NO. Steps to Monitor OAuth Authentication Requests Add Connectors for Each Service: AWS: Add the AWS app connector to monitor OAuth authentication requests for AWS. GitHub: Add the GitHub app connector to monitor OAuth authentication requests for GitHub. Google Workspace: Add the Google Workspace app connector to monitor OAuth authentication requests for Google Workspace. Why Separate Connectors Are Needed Service-Specific Integration: Each connector is designed to integrate with the specific service's API and authentication mechanisms. Comprehensive Monitoring: The Azure app connector is designed to provide visibility and control over Azure resources, but it does not cover OAuth authentication requests for other services like AWS and GitHub. Adding connectors for each service ensures that you can monitor and manage OAuth authentication requests across all your accounts effectively