แก้ไข

แชร์ผ่าน


How Defender for Cloud Apps helps protect your Asana environment

Asana is a cloud-based project management tool that enables your users to collaborate on projects and tasks across your organization and partners in a streamlined and efficient way. Asana holds critical data of your organization, and this makes it a target for malicious actors.

Connecting Asana to Defender for Cloud Apps gives you improved insights into your users' activities and provides threat detection using machine learning based anomaly detections.

Main threats include:

  • Compromised accounts and insider threats
  • Data leakage
  • Insufficient security awareness
  • Unmanaged bring your own device (BYOD)

Control Asana with policies

Type Name
Built-in anomaly detection policy Activity from anonymous IP addresses
Activity from infrequent country
Activity from suspicious IP addresses
Impossible travel
Activity performed by terminated user (requires Microsoft Entra ID as IdP)
Multiple failed login attempts
Activity policy Built a customized policy by using the Asana Audit Log activities

For more information about creating policies, see Create a policy.

Automate governance controls

In addition to monitoring for potential threats, you can apply and automate the following Asana governance actions to remediate detected threats:

Type Action
User governance Notify user on alert (via Microsoft Entra ID)
Require user to sign in again (via Microsoft Entra ID)
Suspend user (via Microsoft Entra ID)

For more information about remediating threats from apps, see Governing connected apps.

Connect Asana to Defender for Cloud Apps

This section describes how to connect Microsoft Defender for Cloud Apps to your existing Asana account using the App Connector APIs. This connection gives you visibility into and control over your organization's Asana use.

Prerequisites

  • An Asana enterprise account.
  • You must be signed-in as an admin to Asana.

To connect Asana:

  1. Sign in to Asana with an admin account.

  2. Copy the service account Token. You might have to Reset and generate new token to copy the token if you have an existing service account.

  3. Copy the workspace ID from the URL and save it for future reference.

Configure Defender for Cloud Apps

  1. In the Microsoft Defender portal, navigate to Settings > Cloud Apps > Connected apps > App Connectors.
  2. Select Connect an app and then select Asana.
  3. Enter an Instance name, and select Next.
  4. Enter the copied access token and workspace ID in API Key and workspace ID fields. Once entered select Submit.
  5. Defender for Cloud Apps will start to fetch Asana audit logs once the connection is successfully established.