Overview
SCU Cost Estimate This agent typically consumes 0.1 – 0.8 SCUs per analysis run, depending on the number of domains discovered, enrichment depth, and lookback window. Larger tenants with extensive SaaS usage or deep threat intelligence correlation may consume more SCUs.
Introduction
Cloud App Activity Profiler helps organizations take control of their SaaS footprint by automatically discovering, profiling, and assessing risk from new or high-volume cloud applications observed in Microsoft Defender for Cloud Apps activity data.
The agent correlates activity telemetry, alert evidence, and threat intelligence to create a unified, evidence-based domain risk assessment. Each discovered domain receives a governance recommendation, ALLOW, MONITOR, or BLOCK, along with a short, repeatable operational playbook for consistent decision-making across your security team.





What It Does
Automatically discovers newly observed and high-volume SaaS domains
Correlates activity and alert data to surface risky or suspicious domains
Enriches findings with threat intelligence indicators and reputation flags
Calculates composite domain risk scores and assigns governance actions
Generates a structured operational playbook for week-to-week consistency
Identifies enrichment and telemetry coverage gaps for improvement
Use Cases
1. Detecting Shadow IT and Unsanctioned SaaS
New domains can appear in your environment without formal review or policy coverage. The agent continuously scans Cloud App activity to discover emerging SaaS services and flags them for governance evaluation, helping you identify Shadow IT before it becomes a security concern.
2. Correlating Exfiltration and Upload Bursts
Large data uploads often indicate potential exfiltration attempts. The agent automatically correlates high-volume uploads with associated alerts and domain reputations, giving analysts a complete picture of the risk in context.
3. Prioritizing Governance Actions
Instead of generic lists of discovered apps, the agent provides clear, actionable recommendations. Domains are categorized into ALLOW, MONITOR, or BLOCK, supported by transparent reasoning and supporting evidence.
4. Streamlining Weekly Governance Reviews
Security and compliance teams often spend hours reviewing new SaaS activity. The agent compiles a concise weekly playbook that summarizes new discoveries, risk levels, and recommended actions, reducing review time while improving consistency.
5. Improving Threat Visibility and Telemetry Coverage
By highlighting missing enrichment data or unmonitored sources, the agent provides concrete guidance on how to strengthen visibility across Cloud App events, alerts, and threat intelligence.
Why Cloud App Activity Profiler?
Challenges It Solves
Shadow or unsanctioned SaaS domains appear without review or policy enforcement
Large uploads lack cross-source correlation and context
Threat intelligence coverage gaps obscure domain risk
Manual triage across telemetry sources is slow and inconsistent
Fragmented data prevents timely governance decisions
Benefits You Get
Continuous discovery and classification of new SaaS domains
Consolidated intelligence combining activity, alerts, and threat data
Clear governance recommendations (ALLOW / MONITOR / BLOCK) with justification
Transparent enrichment gap analysis to guide telemetry improvements
Consistent weekly operational playbook that standardizes decision processes
How It Works
What Goes In
Cloud App activity logs (domain discovery, upload volume, exfiltration heuristics)
Security alerts and alert evidence with related tactics and indicators
Threat intelligence indicators for domain reputation and categorization
(Optional) Directory and user data for normalization and user activity counts
What It Does
Discovers new and high-volume SaaS domains from Cloud App activity
Correlates domain data with alerts and threat intelligence signals
Computes composite domain risk scores and classifies them into risk bands (Green, Yellow, Red)
Generates governance recommendations for ALLOW, MONITOR, or BLOCK decisions
Compiles a 7-day operational playbook for continuous governance tracking
What You Get
Executive summary highlighting key trends and discoveries
Prioritized domain list with risk bands (Green, Yellow, Red)
Evidence-based governance actions with reasoning and context
Enrichment gap summary to improve telemetry visibility
Short operational playbook with recommended next steps and review cadence
Last updated
Was this helpful?