This is a dedicated watch page for a single video.
Your organization has recently implemented Cloud App Discovery in Microsoft Cloud App Security. During a review of the discovery dashboard, you notice that several high-risk cloud applications are being used by employees without IT approval. What should be your first step in responding to this issue?