หมายเหตุ
การเข้าถึงหน้านี้ต้องได้รับการอนุญาต คุณสามารถลอง ลงชื่อเข้าใช้หรือเปลี่ยนไดเรกทอรีได้
การเข้าถึงหน้านี้ต้องได้รับการอนุญาต คุณสามารถลองเปลี่ยนไดเรกทอรีได้
Miro is an online workspace that enables distributed, cross-functional teams organize and collaborate on projects. Miro holds critical data of your organization, and this makes it a target for malicious actors.
Connecting Miro to Defender for Cloud Apps gives you improved insights into your users' activities and provides threat detection using machine learning based anomaly detections.
Main threats
- Compromised accounts and insider threats
- Data leakage
- Insufficient security awareness
- Unmanaged bring your own device (BYOD)
How Defender for Cloud Apps helps to protect your environment
- Detect cloud threats, compromised accounts, and malicious insiders
- Use the audit trail of activities for forensic investigations
Control Miro with policies
| Type | Name |
|---|---|
| Built-in anomaly detection policy | Activity from anonymous IP addresses Activity from infrequent country Activity from suspicious IP addresses Impossible travel Activity performed by terminated user (requires Microsoft Entra ID as IdP) Multiple failed login attempts |
| Activity policy | Built a customized policy by using the Miro Audit Log activities |
For more information about creating policies, see Create a policy.
Automate governance controls
In addition to monitoring for potential threats, you can apply and automate the following Miro governance actions to remediate detected threats:
| Type | Action |
|---|---|
| User governance | Notify user on alert (via Microsoft Entra ID) Require user to sign in again (via Microsoft Entra ID) Suspend user (via Microsoft Entra ID) |
For more information about remediating threats from apps, see Governing connected apps.
Connect Miro to Microsoft Defender for Cloud Apps
This section provides instructions for connecting Microsoft Defender for Cloud Apps to your existing Miro account using the App Connector APIs. This connection gives you visibility into and control over Miro usage.
Prerequisites:
- You must have a Miro account with an enterprise plan.
Configure Miro
- Sign into Miro portal with a company admin account.
- Create a developer team with default permissions.
- Create a new application in the developer team and ensure the “Expire user authentication token” setting is checked.
- Copy the Client ID and Client secret. You'll need them later.
- Configure 'OAuth2.0' by setting the redirect URL to 'https://portal.cloudappsecurity.com/api/oauth/saga'.
- Grant these required permissions, and then select Install app and get OAuth token.
- ‘auditlogs:read’
- ‘organization:read’
Connect Microsoft Defender for Cloud Apps
- In the Defender for Cloud Apps portal, navigate to Investigate > Connected apps.
- In the App connectors page, select Connect an app, and choose Miro.
- In the connection wizard, enter a name for Miro connection, and select Connect Miro.
- Enter the Client ID, Client secret and select Connect in Miro.
- Select the Miro team that you want to connect with Defender for Cloud Apps and select Add again. Note that this Miro team is different from the developer team in which you created the app.
- Select Test now to make sure the connection succeeded. Audit events start flowing into Defender for Cloud apps from the time the connection is successfully established.
Next steps
- If you have any problems connecting the app, see Troubleshooting App Connectors.
- Control cloud apps with policies