
Be aware that it may take several hours for data to be available from API connectors. After that, as data is collected from your configured API connectors, each session is compared to the activity, when users were active, IP addresses, devices, and so on, detected over the past month and the risk score of these activities. The anomaly detection policies are automatically enabled, but Cloud App Security has an initial learning period of seven days during which not all anomaly detection alerts are raised. In addition, the policies expose more data from the Cloud App Security detection engine, to help you speed up the investigation process and contain ongoing threats. Because they're automatically enabled, the new anomaly detection policies immediately start the process of detecting and collating results, targeting numerous behavioral anomalies across your users and the machines and devices connected to your network.

Microsoft Cloud App Security's anomaly detection policies provide out-of-the-box user and entity behavioral analytics (UEBA) and machine learning (ML) so that you're ready from the outset to run advanced threat detection across your cloud environment. To learn more about the recent renaming of Microsoft security services, see the Microsoft Ignite Security blog. For more information about the change, see this announcement.

In the coming weeks, we'll update the screenshots and instructions here and in related pages. It's now called Microsoft Defender for Cloud Apps. We've renamed Microsoft Cloud App Security.
