This demo introduces Microsoft Defender for Cloud Apps discovery—how to uncover the cloud apps your organization is actually using (including the ones nobody officially invited). It shows how discovery is powered by data sources like Defender for Endpoint device signals and network logs, then walks through reviewing discovered apps, their risk scores, categories, and usage patterns. The video highlights how to pivot from “what apps are in play” to “which ones are risky,” so teams can decide what to sanction, what to monitor, and what to block.
To make this feel actionable (not like a museum tour of dashboards), we built the walkthrough around quick decisions: identify apps, assess risk, take the next step. The visual flow stays tight on the fields admins care about, and the edit keeps things moving so viewers remember the workflow, not the menu path. Final delivery includes closed captions, audio description, and thumbnails.



