This is a dedicated watch page for a single video.
Sarah, a security analyst at CloudTech Solutions, is reviewing the company's Microsoft Defender for Cloud Apps implementation. She wants to ensure that their custom SaaS application is properly connected to enhance its security features. Sarah remembers hearing about a report that can help her assess the current security policies across their cloud environment. Which report should Sarah generate in Microsoft Defender for Cloud Apps to get an overview of the security policies applied across all connected apps?