Integrate Microsoft MCAS with Cloudflare Zero Trust
Many security teams rely on Microsoft MCAS (Microsoft Cloud App Security), Microsoft’s CASB solution, to identify and block threats on the Internet, as well as allow or block access to cloud applications. This tutorial covers how to integrate MCAS with Cloudflare Zero Trust, and create Gateway HTTP policies to ensure visibility and control over data.
Microsoft provides an MCAS API endpoint to allow queries to see which applications have been marked as blocked or allowed. With an MCAS API call, you can manage a URL category that contains the blocked URLs returned by the API query, and use the output to create a Hostname List that can be used by Gateway HTTP policies to block them.
Time to complete:
20 minutes
In your Microsoft account, you first need to create an API token and URL endpoint to use to query the URLs blocked by MCAS. Follow the guide for Managing API tokens for Microsoft Cloud App Security ↗ to generate a new API token and a custom API URL for the API endpoint.
Once you have the API token and API URL, use curl to get the list of banned applications from Microsoft MCAS:
This will return a list of banned hostnames. In this case, Angie’s List is the banned application.
As you can see, the banned hostnames are preceded by a .
. To use this output for a Zero Trust List, we need to do some text processing.
-
Run the curl API call and direct the output to a file, in this case
mcas.txt
: -
Remove the leading
.
, for example by runningsed
from the CLI: -
This will give you the list of hostnames without leading
.
. -
Replace the file’s
.txt
extension with.csv
. The file can now be imported into Cloudflare Zero Trust as a Hostname list.
If you would like to get a list of all of the MCAS allowed applications, you can use the same API query, but instead of using type=banned
, use type=allowed
. This will return a much larger list.
- In Zero Trust, go to My Team > Lists
- Select Upload CSV. Even though the hostname list is not really in CSV format, it will work with no issues.
- Add a name for the list, specify “Hostnames” as the list type, and give it a description.
- Drag and drop your MCAS output file created via the API call, or you can select Select a file.
- Select Create. You will see the list of hostnames that have been added to the list.
- Save the list.
Your list is now ready to be referenced by Gateway HTTP policies.
-
Go to Gateway > Firewall policies. Select HTTP.
-
Select Add a policy.
-
Create the following policy.
Selector Operator Value Action Host in list <NEW_HOSTNAME_LIST> Block
Now when trying to visit one of the MCAS defined sites, the user will be blocked.