Skip to content

[CASB] M365 remediation #23744

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 9 commits into from
Jul 25, 2025
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -7,8 +7,11 @@ rss: file
import { DirectoryListing, GlossaryTooltip, Render } from "~/components";

<Render
file="casb/integration-description"
params={{ integrationName: "Microsoft 365 (M365)", integrationAccountType: "Microsoft 365 account" }}
file="casb/integration-description"
params={{
integrationName: "Microsoft 365 (M365)",
integrationAccountType: "Microsoft 365 account",
}}
/>

This integration covers the following Microsoft 365 products:
Expand Down Expand Up @@ -36,13 +39,37 @@ For the Microsoft 365 integration to function, Cloudflare CASB requires the foll
- `Files.Read.All`
- `AuditLog.Read.All`

These permissions follow the principle of least privilege to ensure that only the minimum required access is granted. To learn more about each permission, refer to the [Microsoft Graph permissions documentation](https://docs.microsoft.com/en-us/graph/permissions-reference).
These permissions follow the principle of least privilege to ensure that only the minimum required access is granted.

Additionally, to [remediate findings](/cloudflare-one/applications/casb/manage-findings/#remediate-findings), CASB requires the following permissions:

- `Application.ReadWrite.All`
- `AuditLog.Read.All`
- `Calendars.ReadWrite`
- `Domain.ReadWrite.All`
- `Files.ReadWrite.All`
- `Group.ReadWrite.All`
- `InformationProtectionPolicy.Read.All`
- `MailboxSettings.ReadWrite`
- `IdentityRiskyUser.ReadWrite.All`
- `RoleManagement.ReadWrite.Directory`
- `User.ReadWrite.All`
- `UserAuthenticationMethod.ReadWrite.All`
- `Directory.ReadWrite.All`
- `GroupMember.ReadWrite.All`
- `Organization.ReadWrite.All`
- `Mail.ReadWrite`

To learn more about each permission, refer to the [Microsoft Graph permissions documentation](https://docs.microsoft.com/en-us/graph/permissions-reference).

## Security findings

<Render
file="casb/security-findings"
params={{ integrationName: "Microsoft 365", slugRelativePath: "microsoft-365" }}
file="casb/security-findings"
params={{
integrationName: "Microsoft 365",
slugRelativePath: "microsoft-365",
}}
/>

### User account settings
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -93,7 +93,7 @@ File findings for some integrations (such as [Microsoft 365](/cloudflare-one/app

After reviewing your findings, you may decide that certain posture findings are not applicable to your organization. Cloudflare CASB allows you to remove findings or individual instances of findings from your list of active issues. CASB will continue to scan for these issues, but any detections will appear in a separate tab.

### Hide a finding
### Ignore a finding

1. In [Zero Trust](https://one.dash.cloudflare.com), go to **CASB** > **Posture**.
2. Locate the active finding you want to hide.
Expand All @@ -108,13 +108,68 @@ The finding's status will change from **Active** to **Ignored**. CASB will conti
3. In **Active**, find the instance you want to hide.
4. In the three-dot menu, select **Move to hidden**.

The instance will be moved from **Active** to **Hidden** within the finding. If the finding occurs again for the same user, CASB will report the new instance in the **Hidden** tab. You can move hidden instances back to the **Active** tab at any time.
The instance will be moved from **Active** to **Hidden** within the finding. If the finding occurs again for the same user, CASB will report the new instance quietly in the **Hidden** tab. You can move hidden instances back to the **Active** tab at any time.

## Remediate findings

In addition to detecting and surfacing misconfigurations or issues with SaaS and cloud applications, CASB can also remediate findings directly in applications.

CASB supports remediation for findings from the [Microsoft 365 integration](/cloudflare-one/applications/casb/casb-integrations/microsoft-365/):

<Details header="Supported CASB findings for remediation">

- Microsoft: File publicly accessible with edit access
- Microsoft: File publicly accessible with view access
- Microsoft: File publicly accessible with edit access with DLP Profile match
- Microsoft: File publicly accessible with view access with DLP Profile match

</Details>

### Configure remediation permissions

Before you can remediate findings, [add a new integration](/cloudflare-one/applications/casb/#add-an-integration) and choose _Read-Write mode_ during setup. Alternatively, you can update an existing integration:

1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **CASB** > **Integrations**.
2. Choose your integration, then select **Configure**.
3. In **Integration permissions**, choose _Read-Write mode_.
4. Select **Update integration**. CASB will redirect you to your Microsoft 365 configuration.
5. Sign in to your organization, then select **Accept**.

CASB can now remediate supported findings directly.

### Remediate a finding

To remediate a supported finding:

1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **CASB** > **Posture Findings**.
2. Choose a supported finding type, then select **Manage**.
3. In **Active Instances**, select an instance.
4. In **Remediation details**, choose a remediation action to take.

CASB will begin remediating the instance.

### Manage remediated findings

Remediated findings will appear in **CASB** > **Posture Findings** > **Remediated findings**. The status of the finding will change depending on what action CASB has taken:

| Status | Description |
| ---------- | -------------------------------------------------------------------- |
| Pending | CASB has set the finding to be remediated. |
| Queued | CASB has queued the finding for remediation. |
| Processing | CASB is currently remediating the finding. |
| Completed | CASB successfully remediated the finding. |
| Failed | CASB unsuccessfully remediated the finding. |
| Rejected | CASB does not have the correct permissions to remediate the finding. |

If the status is **Completed**, remediation succeeded. If the status is **Failed** or **Rejected**, remediation failed, and you can select the finding to take action again.

CASB will log remediation actions in **Logs** > **Admin**. For more information, refer to [Zero Trust Logs](/cloudflare-one/insights/logs/).

## Resolve finding with a Gateway policy

Using the security findings from CASB allows for fine-grained Gateway policies which prevent future unwanted behavior while still allowing usage that aligns to your organization's security policy. This means going from viewing a CASB finding, like the use of an unapproved application, to preventing or controlling access in minutes.
Using the security findings from CASB allows for fine-grained Gateway policies which prevent future unwanted behavior while still allowing usage that aligns to your organization's security policy. You can view a CASB finding, like the use of an unapproved application, then immediately prevent or control access with Gateway.

CASB supports creating a Gateway policy with findings from the [Google Workspace integration](/cloudflare-one/applications/casb/casb-integrations/google-workspace/):
CASB supports creating a Gateway policy for findings from the [Google Workspace integration](/cloudflare-one/applications/casb/casb-integrations/google-workspace/):

<Details header="Supported CASB findings for Gateway policies">

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
{}
---

Get alerted when files in your Microsoft 365 account have their permissions changed to a less secure setting.
Get alerted when files in your Microsoft 365 account have their permissions changed to a less secure setting. Additionally, you can automatically remediate certain finding types directly from CASB. For more information, refer to [Remediate findings](/cloudflare-one/applications/casb/manage-findings/#remediate-findings).

| Finding type | FindingTypeID | Severity |
| ------------------------------------------------------ | -------------------------------------- | -------- |
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,6 +2,8 @@
{}
---

Additionally, you can automatically remediate certain finding types directly from CASB. For more information, refer to [Remediate findings](/cloudflare-one/applications/casb/manage-findings/#remediate-findings).

| Finding type | FindingTypeID | Severity |
| --------------------------------------------------------------------------- | -------------------------------------- | -------- |
| Microsoft: File publicly accessible with edit access with DLP Profile match | `7b6ecb52-852f-4184-bf19-175fe59202b7` | Critical |
Expand Down
Loading