{"id":36832,"date":"2020-08-27T18:00:21","date_gmt":"2020-08-27T18:00:21","guid":{"rendered":"https:\/\/www.microsoft.com\/security\/blog\/?p=91786"},"modified":"2020-08-27T18:00:21","modified_gmt":"2020-08-27T18:00:21","slug":"microsoft-zero-trust-deployment-guide-for-your-applications","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/microsoft-zero-trust-deployment-guide-for-your-applications\/","title":{"rendered":"Microsoft Zero Trust deployment guide for your applications"},"content":{"rendered":"<h2>Introduction<\/h2>\n<p>More likely than not, your organization is in the middle of&nbsp;a digital transformation characterized by increased adoption of cloud&nbsp;apps&nbsp;and increased demand for mobility.&nbsp;In the age of remote work, users&nbsp;expect&nbsp;to be able to connect to any resource,&nbsp;on any device, from anywhere in the world. IT admins, in turn, are expected to securely enable their users\u2019&nbsp;productivity,&nbsp;often without changing the infrastructure of their existing solutions.&nbsp;For&nbsp;many&nbsp;organizations,&nbsp;with resources spread across&nbsp;multiple&nbsp;clouds,&nbsp;as well as on-prem,&nbsp;this means&nbsp;supporting&nbsp;complex hybrid&nbsp;deployments.<\/p>\n<p>In this guide, we&nbsp;will&nbsp;focus on how&nbsp;to deploy&nbsp;and configure&nbsp;Microsoft Cloud App Security&nbsp;to&nbsp;apply Zero Trust principles across&nbsp;the&nbsp;app ecosystem,&nbsp;regardless&nbsp;of where&nbsp;those&nbsp;apps reside.&nbsp;Deploying Cloud App Security can&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/blog\/2020\/07\/07\/new-study-customers-save-time-resources-improve-security-microsoft-cloud-app-security\/\" target=\"_blank\" rel=\"noopener noreferrer\">save customers significant time, resources, and of course, improve their security posture<\/a>. We will simplify this deployment, focusing on a few simple steps to get started, and then stepping through more advanced monitoring and controls. Specifically, we\u2019ll walk through the discovery of Shadow IT, ensuring appropriate in-app permissions are enforced, gating access based on real-time analytics, monitoring for abnormal behavior based on real-time UEBA, controlling user interactions with data, and assessing the cloud security posture of an organization.<\/p>\n<h2>Getting&nbsp;started<\/h2>\n<p>Your Zero Trust journey for apps starts with understanding the app ecosystem your employees are using, locking down shadow IT, and managing user activities, data, and threats in the business-critical applications that your workforce leverages to be productive.<\/p>\n<h2>Discover and control the use of Shadow IT<\/h2>\n<p>The total number&nbsp;of apps accessed by employees in the average enterprise exceeds 1,500. That&nbsp;equates to&nbsp;more than 80&nbsp;GB&nbsp;of data uploaded monthly to&nbsp;various&nbsp;apps,&nbsp;less than&nbsp;15%&nbsp;of which&nbsp;are managed by their IT department. And as&nbsp;remote work becomes a reality&nbsp;for most,&nbsp;it\u2019s&nbsp;no longer enough to apply access policies&nbsp;to only&nbsp;your&nbsp;network appliance.<\/p>\n<p>To get started&nbsp;discovering and assessing cloud apps,&nbsp;<a href=\"https:\/\/docs.microsoft.com\/en-us\/cloud-app-security\/best-practices#discover-and-assess-cloud-apps\" target=\"_blank\" rel=\"noopener noreferrer\">set&nbsp;up&nbsp;Cloud Discovery&nbsp;in Microsoft Cloud App Security<\/a>,&nbsp;and&nbsp;analyze&nbsp;your traffic logs against&nbsp;a rich&nbsp;cloud app catalog of over 16,000 cloud apps.&nbsp;Apps are&nbsp;ranked and scored&nbsp;based on more than 90 risk factors to help assess&nbsp;the risk Shadow IT poses&nbsp;to&nbsp;your organization.<\/p>\n<p>Once this risk is&nbsp;understood,&nbsp;each individual application can&nbsp;be evaluated, manually or via policy,&nbsp;to&nbsp;<a href=\"https:\/\/docs.microsoft.com\/en-us\/cloud-app-security\/tutorial-shadow-it\" target=\"_blank\" rel=\"noopener noreferrer\">determine what action to take<\/a>. The following decision tree shows potential actions that can be taken, based on whether the applications\u2019 risk is deemed acceptable. Sanctioned applications can then be onboarded with your identity provider to enable centralized management and more granular control, while unsanctioned applications can be blocked by your network appliance or at the machine-level with <a href=\"https:\/\/docs.microsoft.com\/en-us\/cloud-app-security\/wdatp-integration\" target=\"_blank\" rel=\"noopener noreferrer\">one-click&nbsp;by&nbsp;leveraging Microsoft Defender ATP<\/a>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-91787\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/08\/Zero-1.png\" alt=\"An image of the management of the lifecycle of a discovered app.\" width=\"800\" height=\"450\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/08\/Zero-1.png 800w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/08\/Zero-1-300x169.png 300w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/08\/Zero-1-768x432.png 768w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/08\/Zero-1-687x385.png 687w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/08\/Zero-1-767x431.png 767w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/08\/Zero-1-539x303.png 539w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\"><\/p>\n<h2>Monitor user activities and data<\/h2>\n<p>Once applications are discovered, one of the next steps for sanctioned apps is to connect them via API to gain deep visibility into those applications \u2013 after all, these are the apps where your most sensitive data resides. Microsoft Cloud App Security uses enterprise-grade cloud app APIs to provide instant visibility and governance for each cloud app being used.<\/p>\n<p><a href=\"https:\/\/docs.microsoft.com\/en-us\/cloud-app-security\/enable-instant-visibility-protection-and-governance-actions-for-your-apps\" target=\"_blank\" rel=\"noopener noreferrer\">Connect&nbsp;your business critical cloud applications<\/a>, ranging from Office 365 to Salesforce, Box, AWS, GCP, and more, to Microsoft Cloud App Security to gain deep visibility into the actions, files, and accounts that your users touch day-in and day-out. Leverage these enterprise-grade API connections to enable the admin to perform governance actions, such as quarantining files or suspending users, as well as mitigate against any flagged risk.<\/p>\n<h2>Automate data protection and governance<\/h2>\n<p>For an organization&nbsp;that is&nbsp;constantly growing and evolving, the power of automation cannot be&nbsp;overstated. Once your&nbsp;apps are connected to&nbsp;Microsoft Cloud App Security, you can&nbsp;<a href=\"https:\/\/docs.microsoft.com\/en-us\/cloud-app-security\/control-cloud-apps-with-policies\" target=\"_blank\" rel=\"noopener noreferrer\">leverage versatile policies<\/a> to detect risky behavior and violations, and automate actions to remediate those violations.<\/p>\n<p>Microsoft Cloud App Security provides built-in policies for both risky activities and sensitive files, as well as the ability to create custom policies as needed, based on your own environment. For example, if a user forgets to label sensitive data appropriately before uploading it to the cloud, you can automate the application of the correct label by leveraging Microsoft Cloud App Security to scan the file, whether that app is hosted in a Microsoft or non-Microsoft cloud. In addition, more likely than not, guests or partner users are collaborating with you in your sensitive applications. You can set automatic actions to expire a shared link or removing external users while informing the file owner.<\/p>\n<h2>Protect against cyber threats and rogue apps<\/h2>\n<p>Connecting your apps enables you to automate data and access governance, but it also enables detecting and remediating against cyberthreats and rogue apps. Attackers closely monitor where sensitive information is most likely to end up and develop dedicated and unique attack tools, techniques, and procedures, such as illicit OAuth consent grants and cloud ransomware.<\/p>\n<p>Microsoft Cloud App Security provides&nbsp;rich&nbsp;<a href=\"https:\/\/docs.microsoft.com\/en-us\/cloud-app-security\/anomaly-detection-policy\" target=\"_blank\" rel=\"noopener noreferrer\">behavioral analytics and anomaly detections<\/a>&nbsp;to help organizations securely adopt the cloud by providing malware protection, OAuth app protection, and comprehensive incident investigation and remediation.&nbsp;Because these&nbsp;are already enabled, you do not need to configure them. However, we recommend&nbsp;logging&nbsp;into your Cloud App Security&nbsp;portal&nbsp;to fine-tune them based on your environment (Click on&nbsp;<strong>Control<\/strong>, then&nbsp;<strong>Policies<\/strong>&nbsp;and select&nbsp;<strong>Anomaly detection policy<\/strong>).<\/p>\n<p>Cloud App Security\u2019s user and entity behavioral analytics (UEBA) and machine learning (ML) capabilities are enabled out-of-the-box so that you can immediately detect threats and run advanced threat detection across your cloud environment. Because they\u2019re automatically enabled, new anomaly detection policies provide immediate results by providing immediate detections, targeting numerous security use cases such as impossible travel, suspicious inbox rules and ransomware across your users and the machines and devices connected to your network. In addition, the policies expose more data from the Cloud App Security detection engine and can be refined to help you speed up the investigation process and contain ongoing threats.<\/p>\n<h2>Configuring Advanced Controls<\/h2>\n<p>You\u2019ve&nbsp;now assessed your cloud environment, unsanctioned dangerous and risky applications, and added automation to protect your sensitive corporate resources in your business-critical applications. Getting advanced&nbsp;means&nbsp;extending those security controls by&nbsp;deploying adaptive access controls&nbsp;that match the risk of each individual session and assessing and patching the security posture of your multi-cloud environments.<\/p>\n<h2>Deploy adaptive access and session controls for all apps<\/h2>\n<p>In today\u2019s modern and dynamic workplace, it\u2019s not enough to know what\u2019s happening in your cloud environment after the fact. Stopping breaches and leaks in real-time before employees intentionally or inadvertently put data and organizations at risk is key. Simultaneously, it\u2019s business-critical to enable users to securely use their own devices productively.<\/p>\n<p><a href=\"https:\/\/docs.microsoft.com\/en-us\/cloud-app-security\/proxy-intro-aad\" target=\"_blank\" rel=\"noopener noreferrer\">Enable real-time monitoring and control&nbsp;over access<\/a>&nbsp;to any of your apps with&nbsp;Microsoft Cloud App Security&nbsp;access and session policies, including cloud and on-prem apps&nbsp;and resources&nbsp;hosted by the&nbsp;<a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/active-directory\/manage-apps\/application-proxy\" target=\"_blank\" rel=\"noopener noreferrer\">Azure AD App Proxy.<\/a>&nbsp;For example, you can create policies to protect&nbsp;the&nbsp;download of sensitive content when using any unmanaged device. Alternatively, files can be scanned on upload to detect potential malware and block them from entering sensitive cloud environments.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-91788\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/08\/Zero-2.png\" alt=\"An image displaying how to extend policy enforcement into the session.\" width=\"800\" height=\"450\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/08\/Zero-2.png 800w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/08\/Zero-2-300x169.png 300w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/08\/Zero-2-768x432.png 768w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/08\/Zero-2-687x385.png 687w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/08\/Zero-2-767x431.png 767w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/08\/Zero-2-539x303.png 539w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\"><\/p>\n<h2>Assess the security posture of your cloud environments<\/h2>\n<p>Beyond SaaS applications, organizations are heavily investing in IaaS and PaaS services. Microsoft Cloud App Security goes beyond SaaS security to enable organizations to assess and strengthen their security posture and Zero Trust capabilities for major clouds, such as Azure, Amazon Web Services, and Google Cloud Platform. These assessments focus on detailing the security configuration and compliance status across each cloud platform. In turn, you can limit the risk of a security breach, by keeping the cloud platforms compliant with your organizational configuration policy and regulatory compliance, following the CIS benchmark, or the vendor\u2019s best practices for a secure configuration.<\/p>\n<p>Microsoft Cloud App Security\u2019s cloud platform security provides tenant-level visibility into all your Azure subscriptions, AWS accounts, and GCP projects. Getting an overview of the security configuration posture of your multi-cloud platform from a single location enables a comprehensive risk-based investigation across all your resources. The security configuration dashboard can then be used to drive remediation actions and minimize risk across all your cloud environments. View the <a href=\"https:\/\/docs.microsoft.com\/en-us\/cloud-app-security\/security-config\" target=\"_blank\" rel=\"noopener noreferrer\">security configuration&nbsp;assessments<\/a>&nbsp;for&nbsp;<a href=\"https:\/\/docs.microsoft.com\/en-us\/cloud-app-security\/security-config-azure\" target=\"_blank\" rel=\"noopener noreferrer\">Azure<\/a>,&nbsp;<a href=\"https:\/\/docs.microsoft.com\/en-us\/cloud-app-security\/security-config-aws\" target=\"_blank\" rel=\"noopener noreferrer\">AWS<\/a>, and&nbsp;<a href=\"https:\/\/docs.microsoft.com\/en-us\/cloud-app-security\/security-config-gcp\" target=\"_blank\" rel=\"noopener noreferrer\">GCP<\/a><u>&nbsp;<\/u>recommendations in Cloud App Security to investigate and remediate against any gaps.<\/p>\n<h2>More Zero Trust deployment guides to come<\/h2>\n<p>We hope&nbsp;this blog&nbsp;helps you deploy and successfully incorporate apps into your Zero Trust strategy. Make sure to check out the other deployment guides in the series by following the\u202f<a href=\"https:\/\/www.microsoft.com\/security\/blog\/\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft Security blog<\/a> to keep up with our expert coverage on security matters. For more information on Microsoft Security Solutions \u202f<u><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/zero-trust\" target=\"_blank\" rel=\"noopener noreferrer\">visit our website<\/a><\/u>. Also, follow us at\u202f<a href=\"https:\/\/twitter.com\/@MSFTSecurity\" target=\"_blank\" rel=\"noopener noreferrer\">@MSFTSecurity<\/a>\u202ffor the latest news and updates on cybersecurity.<\/p>\n<p> READ MORE <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2020\/08\/27\/zero-trust-deployment-guide-microsoft-applications\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Leverage Microsoft Cloud App Security to secure your digital transformation, by protecting all your apps and resources with the principles of Zero Trust.<br \/>\nThe post Microsoft Zero Trust deployment guide for your applications appeared first on Microsoft Security. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":36833,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[276],"tags":[1253,8533,1064,3677],"class_list":["post-36832","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-secure","tag-cloud-computing","tag-secure-remote-work","tag-security-intelligence","tag-zero-trust"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Microsoft Zero Trust deployment guide for your applications 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/microsoft-zero-trust-deployment-guide-for-your-applications\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microsoft Zero Trust deployment guide for your applications 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/microsoft-zero-trust-deployment-guide-for-your-applications\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-08-27T18:00:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/08\/microsoft-zero-trust-deployment-guide-for-your-applications.png\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"450\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-zero-trust-deployment-guide-for-your-applications\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-zero-trust-deployment-guide-for-your-applications\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Microsoft Zero Trust deployment guide for your applications\",\"datePublished\":\"2020-08-27T18:00:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-zero-trust-deployment-guide-for-your-applications\\\/\"},\"wordCount\":1574,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-zero-trust-deployment-guide-for-your-applications\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/microsoft-zero-trust-deployment-guide-for-your-applications.png\",\"keywords\":[\"cloud computing\",\"Secure remote work\",\"Security Intelligence\",\"Zero Trust\"],\"articleSection\":[\"Microsoft Secure\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-zero-trust-deployment-guide-for-your-applications\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-zero-trust-deployment-guide-for-your-applications\\\/\",\"name\":\"Microsoft Zero Trust deployment guide for your applications 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-zero-trust-deployment-guide-for-your-applications\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-zero-trust-deployment-guide-for-your-applications\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/microsoft-zero-trust-deployment-guide-for-your-applications.png\",\"datePublished\":\"2020-08-27T18:00:21+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-zero-trust-deployment-guide-for-your-applications\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-zero-trust-deployment-guide-for-your-applications\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-zero-trust-deployment-guide-for-your-applications\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/microsoft-zero-trust-deployment-guide-for-your-applications.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/microsoft-zero-trust-deployment-guide-for-your-applications.png\",\"width\":800,\"height\":450},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-zero-trust-deployment-guide-for-your-applications\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"cloud computing\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/cloud-computing\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Microsoft Zero Trust deployment guide for your applications\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Microsoft Zero Trust deployment guide for your applications 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/microsoft-zero-trust-deployment-guide-for-your-applications\/","og_locale":"en_US","og_type":"article","og_title":"Microsoft Zero Trust deployment guide for your applications 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/microsoft-zero-trust-deployment-guide-for-your-applications\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-08-27T18:00:21+00:00","og_image":[{"width":800,"height":450,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/08\/microsoft-zero-trust-deployment-guide-for-your-applications.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/microsoft-zero-trust-deployment-guide-for-your-applications\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-zero-trust-deployment-guide-for-your-applications\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Microsoft Zero Trust deployment guide for your applications","datePublished":"2020-08-27T18:00:21+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-zero-trust-deployment-guide-for-your-applications\/"},"wordCount":1574,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-zero-trust-deployment-guide-for-your-applications\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/08\/microsoft-zero-trust-deployment-guide-for-your-applications.png","keywords":["cloud computing","Secure remote work","Security Intelligence","Zero Trust"],"articleSection":["Microsoft Secure"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/microsoft-zero-trust-deployment-guide-for-your-applications\/","url":"https:\/\/www.threatshub.org\/blog\/microsoft-zero-trust-deployment-guide-for-your-applications\/","name":"Microsoft Zero Trust deployment guide for your applications 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-zero-trust-deployment-guide-for-your-applications\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-zero-trust-deployment-guide-for-your-applications\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/08\/microsoft-zero-trust-deployment-guide-for-your-applications.png","datePublished":"2020-08-27T18:00:21+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-zero-trust-deployment-guide-for-your-applications\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/microsoft-zero-trust-deployment-guide-for-your-applications\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/microsoft-zero-trust-deployment-guide-for-your-applications\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/08\/microsoft-zero-trust-deployment-guide-for-your-applications.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/08\/microsoft-zero-trust-deployment-guide-for-your-applications.png","width":800,"height":450},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/microsoft-zero-trust-deployment-guide-for-your-applications\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"cloud computing","item":"https:\/\/www.threatshub.org\/blog\/tag\/cloud-computing\/"},{"@type":"ListItem","position":3,"name":"Microsoft Zero Trust deployment guide for your applications"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/36832","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=36832"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/36832\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/36833"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=36832"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=36832"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=36832"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}