{"id":953,"date":"2025-02-07T14:05:47","date_gmt":"2025-02-07T14:05:47","guid":{"rendered":"https:\/\/bryanlopez.com\/?p=953"},"modified":"2025-02-07T14:11:16","modified_gmt":"2025-02-07T14:11:16","slug":"how-to-block-unsanctioned-ai-apps-why-it-matters","status":"publish","type":"post","link":"https:\/\/bryanlopez.com\/?p=953","title":{"rendered":"How to Block Unsanctioned AI apps &amp; why it matters."},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"953\" class=\"elementor elementor-953\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-769937d0 e-flex e-con-boxed e-con e-parent\" data-id=\"769937d0\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5f94b62c elementor-widget elementor-widget-text-editor\" data-id=\"5f94b62c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\n<p>Generative AI applications are transforming how organizations operate. From automated content creation to advanced analytics, these tools can streamline processes and spark innovation. However, they also introduce new risks: data leakage, compliance violations, and misuse of corporate resources. Blocking <strong>unsanctioned<\/strong> AI apps isn\u2019t just about preventing unauthorized software\u2014it\u2019s about <strong>protecting your organization\u2019s data, reputation, and regulatory standing<\/strong>.<\/p>\n\n<p>Below is a technical, step-by-step guide showing how Microsoft Defender for Cloud Apps can help you <strong>discover<\/strong>, <strong>monitor<\/strong>, and <strong>block<\/strong> risky AI apps\u2014while integrating with other Microsoft security solutions to strengthen your organization\u2019s overall security posture.<\/p>\n\n<h2 class=\"wp-block-heading\">1. The Importance of Blocking Unsanctioned AI Apps<\/h2>\n\n<ol class=\"wp-block-list\">\n<li><strong>Data Privacy and Compliance<\/strong><br \/>Generative AI apps may process sensitive information or store data in locations that violate internal policies or regulations (e.g., SOC2, HIPAA, GDPR). Blocking unsanctioned apps ensures that only vetted tools can access or handle your organization\u2019s data.<\/li>\n\n<li><strong>Reduced Attack Surface<\/strong><br \/>Each AI app\u2014especially one using large language models\u2014can expand your organization\u2019s attack surface. Poorly configured apps or unknown dependencies can lead to data breaches or system compromise.<\/li>\n\n<li><strong>Maintaining Visibility<\/strong><br \/>Sanctioned AI apps typically undergo security assessments and maintain documentation for support and auditing. Unsanctioned apps, by contrast, hide in the shadows\u2014leading to blind spots in both operations and incident response.<\/li>\n\n<li><strong>Preserving Resource Efficiency<\/strong><br \/>Generative AI tools can consume significant computational resources. Blocking unsanctioned apps helps you manage cloud costs and ensure bandwidth is allocated to approved tools.<\/li>\n<\/ol>\n\n<p>For more information on the importance of discovering and monitoring AI apps, refer to Microsoft\u2019s official guidance:<br \/><a href=\"https:\/\/techcommunity.microsoft.com\/blog\/microsoftthreatprotectionblog\/discover-monitor-and-protect-the-use-of-generative-ai-apps\/3999228\">Discover, monitor, and protect the use of generative AI apps<\/a><\/p>\n\n<h2 class=\"wp-block-heading\">2. Discovering Generative AI Apps<\/h2>\n\n<p>The first step in controlling AI usage is to <strong>find<\/strong> which apps employees are already using\u2014even unknowingly. Microsoft Defender for Cloud Apps offers a <strong>Cloud App Catalog<\/strong> featuring hundreds of AI apps.<\/p>\n\n<h3 class=\"wp-block-heading\">Step-by-Step<\/h3>\n\n<ol class=\"wp-block-list\">\n<li><strong>Navigate to the Cloud App Catalog<\/strong>\n<ul class=\"wp-block-list\">\n<li>Go to the Microsoft Defender for Cloud Apps portal.<\/li>\n\n<li>Select <strong>Discover &gt; Cloud App Catalog<\/strong>.<\/li>\n\n<li>Use the search bar or filters to locate the new <strong>\u201cGenerative AI\u201d<\/strong> category.<\/li>\n<\/ul>\n<\/li>\n\n<li><strong>Configure Discovery Policies<\/strong>\n<ul class=\"wp-block-list\">\n<li>Go to <strong>Control &gt; Policies<\/strong> in Defender for Cloud Apps.<\/li>\n\n<li>Create a new <strong>App discovery<\/strong> policy.<\/li>\n\n<li>Include the <strong>\u201cGenerative AI\u201d<\/strong> category, and set risk thresholds (e.g., compliance certifications, region of data storage) to capture the apps you\u2019re most concerned about.<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n\n<p><strong>Tip:<\/strong> Automatically classify AI apps by risk score. For example, you can flag generative AI apps that <strong>lack SOC2 compliance<\/strong> as higher-risk and in need of immediate review.<\/p>\n\n<h2 class=\"wp-block-heading\">3. Monitoring and Managing Risk<\/h2>\n\n<p>After discovering which generative AI apps are in use, set up policies that <strong>trigger alerts<\/strong> when new AI apps appear or when unusual usage patterns occur.<\/p>\n\n<h3 class=\"wp-block-heading\">Step-by-Step<\/h3>\n\n<ol class=\"wp-block-list\">\n<li><strong>Create Activity Policies<\/strong>\n<ul class=\"wp-block-list\">\n<li>Go to <strong>Control &gt; Policies<\/strong>.<\/li>\n\n<li>Select <strong>Create policy &gt; Activity policy<\/strong>.<\/li>\n\n<li>Define conditions that trigger alerts for generative AI usage (e.g., creation of large data exports, repeated sensitive document uploads).<\/li>\n<\/ul>\n<\/li>\n\n<li><strong>Configure Alerts<\/strong>\n<ul class=\"wp-block-list\">\n<li>Go to <strong>Settings &gt; Alerts<\/strong>.<\/li>\n\n<li>Create alert rules to notify security teams when suspicious or newly discovered generative AI apps are detected.<\/li>\n\n<li>Route alerts to the appropriate communication channels (email, Teams, SIEM, etc.) for rapid response.<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n\n<p><strong>Why This Matters:<\/strong><br \/>Proactive alerts ensure you can <strong>act immediately<\/strong> when employees start using high-risk AI apps. This helps you address potential security or compliance issues before they escalate.<\/p>\n\n<h2 class=\"wp-block-heading\">4. Blocking Unsanctioned Apps<\/h2>\n\n<p>Once you\u2019ve identified risky or non-compliant AI apps, the next step is to <strong>unsanction<\/strong> them. By integrating with Microsoft Defender for Endpoint, you can <strong>automatically block<\/strong> these apps on managed devices.<\/p>\n\n<h3 class=\"wp-block-heading\">Step-by-Step<\/h3>\n\n<ol class=\"wp-block-list\">\n<li><strong>Unsanction Apps<\/strong>\n<ul class=\"wp-block-list\">\n<li>Return to the <strong>Cloud App Catalog<\/strong> in Defender for Cloud Apps.<\/li>\n\n<li>Locate the <strong>generative AI apps<\/strong> you want to block.<\/li>\n\n<li>Click <strong>Unsanction<\/strong>. This marks the app as \u201cunsanctioned\u201d within your environment.<\/li>\n<\/ul>\n<\/li>\n\n<li><strong>Integrate with Defender for Endpoint<\/strong>\n<ul class=\"wp-block-list\">\n<li>In Defender for Cloud Apps, ensure <strong>Microsoft Defender for Endpoint<\/strong> is integrated by visiting <strong>Settings &gt; Cloud App Security<\/strong> (or the Integration section).<\/li>\n\n<li>Once integration is enabled, any app flagged as \u201cunsanctioned\u201d will be <strong>automatically blocked<\/strong> on devices managed by Defender for Endpoint.<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n\n<p><strong>Key Benefit:<\/strong><br \/>By enforcing a strict \u201cunsanctioned = blocked\u201d policy, you prevent data from ever reaching these applications, drastically reducing the risk of unauthorized access or data leaks.<\/p>\n\n<h2 class=\"wp-block-heading\">5. Enhancing Security Posture with Microsoft Purview<\/h2>\n\n<p>Defender for Cloud Apps integrates with <strong>Microsoft Purview<\/strong> for advanced security and compliance features. This includes <strong>built-in recommendations<\/strong> to harden your AI usage.<\/p>\n\n<h3 class=\"wp-block-heading\">Step-by-Step<\/h3>\n\n<ol class=\"wp-block-list\">\n<li><strong>Integrate with Microsoft Purview<\/strong>\n<ul class=\"wp-block-list\">\n<li>Go to <strong>Settings &gt; Integrations<\/strong> in Defender for Cloud Apps.<\/li>\n\n<li>Configure the <strong>Microsoft Purview<\/strong> integration. This enables you to import compliance controls and recommended best practices.<\/li>\n<\/ul>\n<\/li>\n\n<li><strong>Review Security Recommendations<\/strong>\n<ul class=\"wp-block-list\">\n<li>Navigate to <strong>Security &gt; Recommendations<\/strong> within Defender for Cloud Apps.<\/li>\n\n<li>Implement suggested actions\u2014like improved logging, user permission reviews, or additional encryption controls\u2014to <strong>strengthen your AI security posture<\/strong>.<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n\n<p><strong>Why Purview?<\/strong><br \/>Purview provides <strong>end-to-end data governance<\/strong>, ensuring that data remains secure and compliant throughout its lifecycle, even as it traverses multiple AI applications and services.<\/p>\n\n<p>For details on building a comprehensive AI security posture from code to runtime, see:<br \/><a href=\"https:\/\/techcommunity.microsoft.com\/blog\/microsoftdefendercloudblog\/secure-your-ai-applications-from-code-to-runtime-with-microsoft-defender-for-clo\/4127665\">Secure your AI applications from code to runtime with Microsoft Defender for Cloud<\/a><\/p>\n\n<h2 class=\"wp-block-heading\">6. Conclusion<\/h2>\n\n<p>Blocking unsanctioned AI apps isn\u2019t about stifling innovation\u2014it\u2019s about <strong>empowering<\/strong> your organization to use AI responsibly and securely. By using Microsoft Defender for Cloud Apps to discover, monitor, and unsanction AI apps, you can protect sensitive data, meet compliance obligations, and maintain visibility over your AI ecosystem.<\/p>\n\n<p><strong>Key Takeaways:<\/strong><\/p>\n\n<ul class=\"wp-block-list\">\n<li><strong>Visibility First<\/strong>: Identify all generative AI apps in use to avoid security blind spots.<\/li>\n\n<li><strong>Policy Enforcement<\/strong>: Automate risk assessments and alerts so that suspicious or non-compliant apps don\u2019t slip through the cracks.<\/li>\n\n<li><strong>Endpoint Blocking<\/strong>: Combine Defender for Cloud Apps with Defender for Endpoint to instantly prevent risky AI apps from running on managed devices.<\/li>\n\n<li><strong>Continual Improvement<\/strong>: Integrate with Microsoft Purview and follow security recommendations to create a robust, adaptable defensive posture.<\/li>\n<\/ul>\n\n<p>By implementing these steps, organizations can harness the power of generative AI while minimizing potential risks\u2014allowing innovation to flourish in a secure, compliant environment.<\/p>\n\n<h3 class=\"wp-block-heading\">Additional References<\/h3>\n\n<ol class=\"wp-block-list\">\n<li><a href=\"https:\/\/techcommunity.microsoft.com\/blog\/microsoftthreatprotectionblog\/discover-monitor-and-protect-the-use-of-generative-ai-apps\/3999228\">Discover, monitor, and protect the use of generative AI apps<\/a><\/li>\n\n<li><a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/defender-for-cloud\/ai-security-posture\">AI security posture management &#8211; Microsoft Defender for Cloud<\/a><\/li>\n\n<li><a href=\"https:\/\/techcommunity.microsoft.com\/blog\/microsoftdefendercloudblog\/secure-your-ai-applications-from-code-to-runtime-with-microsoft-defender-for-clo\/4127665\">Secure your AI applications from code to runtime with Microsoft Defender for Cloud<\/a><\/li>\n\n<li><a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/defender-for-cloud\/recommendations-reference-ai\">Reference table for all AI security recommendations in Microsoft Defender for Cloud<\/a><\/li>\n<\/ol>\n\n<p>By following the outlined steps and leveraging Microsoft\u2019s integrated security offerings, you can confidently empower your teams to explore generative AI\u2014while keeping your organization\u2019s data, compliance posture, and reputation intact.<\/p>\n\n<p>\u00a0<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Blocking unsanctioned AI apps isn\u2019t just about preventing unauthorized software\u2014it\u2019s about protecting your organization\u2019s data, reputation, and regulatory standing.<\/p>\n<p>Below is a technical, step-by-step guide showing how Microsoft Defender for Cloud Apps can help you discover, monitor, and block risky AI apps\u2014while integrating with other Microsoft security solutions to strengthen your organization\u2019s overall security posture<\/p>\n","protected":false},"author":1,"featured_media":955,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ocean_post_layout":"","ocean_both_sidebars_style":"","ocean_both_sidebars_content_width":0,"ocean_both_sidebars_sidebars_width":0,"ocean_sidebar":"","ocean_second_sidebar":"","ocean_disable_margins":"enable","ocean_add_body_class":"","ocean_shortcode_before_top_bar":"","ocean_shortcode_after_top_bar":"","ocean_shortcode_before_header":"","ocean_shortcode_after_header":"","ocean_has_shortcode":"","ocean_shortcode_after_title":"","ocean_shortcode_before_footer_widgets":"","ocean_shortcode_after_footer_widgets":"","ocean_shortcode_before_footer_bottom":"","ocean_shortcode_after_footer_bottom":"","ocean_display_top_bar":"default","ocean_display_header":"default","ocean_header_style":"","ocean_center_header_left_menu":"","ocean_custom_header_template":"","ocean_custom_logo":0,"ocean_custom_retina_logo":0,"ocean_custom_logo_max_width":0,"ocean_custom_logo_tablet_max_width":0,"ocean_custom_logo_mobile_max_width":0,"ocean_custom_logo_max_height":0,"ocean_custom_logo_tablet_max_height":0,"ocean_custom_logo_mobile_max_height":0,"ocean_header_custom_menu":"","ocean_menu_typo_font_family":"","ocean_menu_typo_font_subset":"","ocean_menu_typo_font_size":0,"ocean_menu_typo_font_size_tablet":0,"ocean_menu_typo_font_size_mobile":0,"ocean_menu_typo_font_size_unit":"px","ocean_menu_typo_font_weight":"","ocean_menu_typo_font_weight_tablet":"","ocean_menu_typo_font_weight_mobile":"","ocean_menu_typo_transform":"","ocean_menu_typo_transform_tablet":"","ocean_menu_typo_transform_mobile":"","ocean_menu_typo_line_height":0,"ocean_menu_typo_line_height_tablet":0,"ocean_menu_typo_line_height_mobile":0,"ocean_menu_typo_line_height_unit":"","ocean_menu_typo_spacing":0,"ocean_menu_typo_spacing_tablet":0,"ocean_menu_typo_spacing_mobile":0,"ocean_menu_typo_spacing_unit":"","ocean_menu_link_color":"","ocean_menu_link_color_hover":"","ocean_menu_link_color_active":"","ocean_menu_link_background":"","ocean_menu_link_hover_background":"","ocean_menu_link_active_background":"","ocean_menu_social_links_bg":"","ocean_menu_social_hover_links_bg":"","ocean_menu_social_links_color":"","ocean_menu_social_hover_links_color":"","ocean_disable_title":"default","ocean_disable_heading":"default","ocean_post_title":"","ocean_post_subheading":"","ocean_post_title_style":"","ocean_post_title_background_color":"","ocean_post_title_background":0,"ocean_post_title_bg_image_position":"","ocean_post_title_bg_image_attachment":"","ocean_post_title_bg_image_repeat":"","ocean_post_title_bg_image_size":"","ocean_post_title_height":0,"ocean_post_title_bg_overlay":0.5,"ocean_post_title_bg_overlay_color":"","ocean_disable_breadcrumbs":"default","ocean_breadcrumbs_color":"","ocean_breadcrumbs_separator_color":"","ocean_breadcrumbs_links_color":"","ocean_breadcrumbs_links_hover_color":"","ocean_display_footer_widgets":"default","ocean_display_footer_bottom":"default","ocean_custom_footer_template":"","ofc_meta_disable_footer_callout":"","ofc_meta_callout_button_url":"","ofc_meta_callout_button_txt":"","ofc_meta_callout_text":"","ofc_enable_fullscreen":"disable","ofc_fullscreen_speed":0,"ofc_fullscreen_nav":"enable","ofc_fullscreen_nav_pos":"right","ofc_fullscreen_nav_color":"","ofc_fullscreen_nav_tooltip_color":"","ofc_fullscreen_responsive":0,"osp_disable_panel":"default","osh_disable_topbar_sticky":"default","osh_disable_header_sticky":"default","osh_sticky_header_style":"default","osh_sticky_header_effect":"","osh_custom_sticky_logo":0,"osh_custom_retina_sticky_logo":0,"osh_custom_sticky_logo_height":0,"osh_background_color":"","osh_links_color":"","osh_links_hover_color":"","osh_links_active_color":"","osh_links_bg_color":"","osh_links_hover_bg_color":"","osh_links_active_bg_color":"","osh_menu_social_links_color":"","osh_menu_social_hover_links_color":"","ocean_post_oembed":"","ocean_post_self_hosted_media":"","ocean_post_video_embed":"","ocean_link_format":"","ocean_link_format_target":"self","ocean_quote_format":"","ocean_quote_format_link":"post","ocean_gallery_link_images":"on","ocean_gallery_id":[],"footnotes":""},"categories":[18,17,20,32,19],"tags":[21,27,33,34,35],"class_list":["post-953","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ai","category-cyber-policy","category-cybersecurity","category-microsoft","category-risk","tag-ai","tag-bryan-lopez","tag-casb","tag-defender","tag-microsoft","entry","has-media"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\r\n<title>How to Block Unsanctioned AI apps &amp; why it matters. - Bryan Lopez<\/title>\r\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<link rel=\"canonical\" href=\"https:\/\/bryanlopez.azurewebsites.net\/?p=953\" \/>\r\n<meta property=\"og:locale\" content=\"en_US\" \/>\r\n<meta property=\"og:type\" content=\"article\" \/>\r\n<meta property=\"og:title\" content=\"How to Block Unsanctioned AI apps &amp; why it matters. - Bryan Lopez\" \/>\r\n<meta property=\"og:description\" content=\"Blocking unsanctioned AI apps isn\u2019t just about preventing unauthorized software\u2014it\u2019s about protecting your organization\u2019s data, reputation, and regulatory standing. Below is a technical, step-by-step guide showing how Microsoft Defender for Cloud Apps can help you discover, monitor, and block risky AI apps\u2014while integrating with other Microsoft security solutions to strengthen your organization\u2019s overall security posture\" \/>\r\n<meta property=\"og:url\" content=\"https:\/\/bryanlopez.azurewebsites.net\/?p=953\" \/>\r\n<meta property=\"og:site_name\" content=\"Bryan Lopez\" \/>\r\n<meta property=\"article:published_time\" content=\"2025-02-07T14:05:47+00:00\" \/>\r\n<meta property=\"article:modified_time\" content=\"2025-02-07T14:11:16+00:00\" \/>\r\n<meta property=\"og:image\" content=\"https:\/\/bryanlopez.com\/wp-content\/uploads\/2025\/02\/blockedAI.png\" \/>\r\n\t<meta property=\"og:image:width\" content=\"2100\" \/>\r\n\t<meta property=\"og:image:height\" content=\"1500\" \/>\r\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\r\n<meta name=\"author\" content=\"Bryan Lopez\" \/>\r\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\r\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bryan Lopez\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\r\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/bryanlopez.azurewebsites.net\\\/?p=953#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/bryanlopez.azurewebsites.net\\\/?p=953\"},\"author\":{\"name\":\"Bryan Lopez\",\"@id\":\"https:\\\/\\\/bryanlopez.com\\\/#\\\/schema\\\/person\\\/fded6a4862b8f769e1548e07c1bddd88\"},\"headline\":\"How to Block Unsanctioned AI apps &amp; why it matters.\",\"datePublished\":\"2025-02-07T14:05:47+00:00\",\"dateModified\":\"2025-02-07T14:11:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/bryanlopez.azurewebsites.net\\\/?p=953\"},\"wordCount\":1076,\"image\":{\"@id\":\"https:\\\/\\\/bryanlopez.azurewebsites.net\\\/?p=953#primaryimage\"},\"thumbnailUrl\":\"\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/blockedAI.png\",\"keywords\":[\"ai\",\"bryan lopez\",\"casb\",\"defender\",\"microsoft\"],\"articleSection\":[\"AI\",\"Cyber Policy\",\"Cybersecurity\",\"Microsoft\",\"Risk\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/bryanlopez.azurewebsites.net\\\/?p=953\",\"url\":\"https:\\\/\\\/bryanlopez.azurewebsites.net\\\/?p=953\",\"name\":\"How to Block Unsanctioned AI apps &amp; why it matters. - Bryan Lopez\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/bryanlopez.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/bryanlopez.azurewebsites.net\\\/?p=953#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/bryanlopez.azurewebsites.net\\\/?p=953#primaryimage\"},\"thumbnailUrl\":\"\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/blockedAI.png\",\"datePublished\":\"2025-02-07T14:05:47+00:00\",\"dateModified\":\"2025-02-07T14:11:16+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/bryanlopez.com\\\/#\\\/schema\\\/person\\\/fded6a4862b8f769e1548e07c1bddd88\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/bryanlopez.azurewebsites.net\\\/?p=953#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/bryanlopez.azurewebsites.net\\\/?p=953\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/bryanlopez.azurewebsites.net\\\/?p=953#primaryimage\",\"url\":\"\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/blockedAI.png\",\"contentUrl\":\"\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/blockedAI.png\",\"width\":2100,\"height\":1500,\"caption\":\"A red image that says blocked AI\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/bryanlopez.azurewebsites.net\\\/?p=953#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/bryanlopez.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Block Unsanctioned AI apps &amp; why it matters.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/bryanlopez.com\\\/#website\",\"url\":\"https:\\\/\\\/bryanlopez.com\\\/\",\"name\":\"Bryan Lopez - Technology & Cybersecurity\",\"description\":\"Technology &amp; Cybersecurity\",\"alternateName\":\"The official blog of Cyber policy and law expert Bryan Lopez\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/bryanlopez.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/bryanlopez.com\\\/#\\\/schema\\\/person\\\/fded6a4862b8f769e1548e07c1bddd88\",\"name\":\"Bryan Lopez\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c4ec14d2b0ff62a83483bd2dcbaec9d419161264e93784db6aa99045c4826361?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c4ec14d2b0ff62a83483bd2dcbaec9d419161264e93784db6aa99045c4826361?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c4ec14d2b0ff62a83483bd2dcbaec9d419161264e93784db6aa99045c4826361?s=96&d=mm&r=g\",\"caption\":\"Bryan Lopez\"},\"description\":\"Director &amp; Technology strategist with a demonstrated history in cybersecurity, systems architecture, cloud services and development. A trusted technical adviser to various security organizations within the federal government. Currently a part of the Federal Science and Research Division at Microsoft, supporting the Department of Energy.\",\"sameAs\":[\"https:\\\/\\\/bryanlopez.com\"],\"url\":\"https:\\\/\\\/bryanlopez.com\\\/?author=1\"}]}<\/script>\r\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Block Unsanctioned AI apps &amp; why it matters. - Bryan Lopez","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/bryanlopez.azurewebsites.net\/?p=953","og_locale":"en_US","og_type":"article","og_title":"How to Block Unsanctioned AI apps &amp; why it matters. - Bryan Lopez","og_description":"Blocking unsanctioned AI apps isn\u2019t just about preventing unauthorized software\u2014it\u2019s about protecting your organization\u2019s data, reputation, and regulatory standing. Below is a technical, step-by-step guide showing how Microsoft Defender for Cloud Apps can help you discover, monitor, and block risky AI apps\u2014while integrating with other Microsoft security solutions to strengthen your organization\u2019s overall security posture","og_url":"https:\/\/bryanlopez.azurewebsites.net\/?p=953","og_site_name":"Bryan Lopez","article_published_time":"2025-02-07T14:05:47+00:00","article_modified_time":"2025-02-07T14:11:16+00:00","og_image":[{"width":2100,"height":1500,"url":"https:\/\/bryanlopez.com\/wp-content\/uploads\/2025\/02\/blockedAI.png","type":"image\/png"}],"author":"Bryan Lopez","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Bryan Lopez","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/bryanlopez.azurewebsites.net\/?p=953#article","isPartOf":{"@id":"https:\/\/bryanlopez.azurewebsites.net\/?p=953"},"author":{"name":"Bryan Lopez","@id":"https:\/\/bryanlopez.com\/#\/schema\/person\/fded6a4862b8f769e1548e07c1bddd88"},"headline":"How to Block Unsanctioned AI apps &amp; why it matters.","datePublished":"2025-02-07T14:05:47+00:00","dateModified":"2025-02-07T14:11:16+00:00","mainEntityOfPage":{"@id":"https:\/\/bryanlopez.azurewebsites.net\/?p=953"},"wordCount":1076,"image":{"@id":"https:\/\/bryanlopez.azurewebsites.net\/?p=953#primaryimage"},"thumbnailUrl":"\/wp-content\/uploads\/2025\/02\/blockedAI.png","keywords":["ai","bryan lopez","casb","defender","microsoft"],"articleSection":["AI","Cyber Policy","Cybersecurity","Microsoft","Risk"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/bryanlopez.azurewebsites.net\/?p=953","url":"https:\/\/bryanlopez.azurewebsites.net\/?p=953","name":"How to Block Unsanctioned AI apps &amp; why it matters. - Bryan Lopez","isPartOf":{"@id":"https:\/\/bryanlopez.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/bryanlopez.azurewebsites.net\/?p=953#primaryimage"},"image":{"@id":"https:\/\/bryanlopez.azurewebsites.net\/?p=953#primaryimage"},"thumbnailUrl":"\/wp-content\/uploads\/2025\/02\/blockedAI.png","datePublished":"2025-02-07T14:05:47+00:00","dateModified":"2025-02-07T14:11:16+00:00","author":{"@id":"https:\/\/bryanlopez.com\/#\/schema\/person\/fded6a4862b8f769e1548e07c1bddd88"},"breadcrumb":{"@id":"https:\/\/bryanlopez.azurewebsites.net\/?p=953#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/bryanlopez.azurewebsites.net\/?p=953"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/bryanlopez.azurewebsites.net\/?p=953#primaryimage","url":"\/wp-content\/uploads\/2025\/02\/blockedAI.png","contentUrl":"\/wp-content\/uploads\/2025\/02\/blockedAI.png","width":2100,"height":1500,"caption":"A red image that says blocked AI"},{"@type":"BreadcrumbList","@id":"https:\/\/bryanlopez.azurewebsites.net\/?p=953#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/bryanlopez.com\/"},{"@type":"ListItem","position":2,"name":"How to Block Unsanctioned AI apps &amp; why it matters."}]},{"@type":"WebSite","@id":"https:\/\/bryanlopez.com\/#website","url":"https:\/\/bryanlopez.com\/","name":"Bryan Lopez - Technology & Cybersecurity","description":"Technology &amp; Cybersecurity","alternateName":"The official blog of Cyber policy and law expert Bryan Lopez","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/bryanlopez.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/bryanlopez.com\/#\/schema\/person\/fded6a4862b8f769e1548e07c1bddd88","name":"Bryan Lopez","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c4ec14d2b0ff62a83483bd2dcbaec9d419161264e93784db6aa99045c4826361?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c4ec14d2b0ff62a83483bd2dcbaec9d419161264e93784db6aa99045c4826361?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c4ec14d2b0ff62a83483bd2dcbaec9d419161264e93784db6aa99045c4826361?s=96&d=mm&r=g","caption":"Bryan Lopez"},"description":"Director &amp; Technology strategist with a demonstrated history in cybersecurity, systems architecture, cloud services and development. A trusted technical adviser to various security organizations within the federal government. Currently a part of the Federal Science and Research Division at Microsoft, supporting the Department of Energy.","sameAs":["https:\/\/bryanlopez.com"],"url":"https:\/\/bryanlopez.com\/?author=1"}]}},"_links":{"self":[{"href":"https:\/\/bryanlopez.com\/index.php?rest_route=\/wp\/v2\/posts\/953","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bryanlopez.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bryanlopez.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bryanlopez.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/bryanlopez.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=953"}],"version-history":[{"count":7,"href":"https:\/\/bryanlopez.com\/index.php?rest_route=\/wp\/v2\/posts\/953\/revisions"}],"predecessor-version":[{"id":961,"href":"https:\/\/bryanlopez.com\/index.php?rest_route=\/wp\/v2\/posts\/953\/revisions\/961"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bryanlopez.com\/index.php?rest_route=\/wp\/v2\/media\/955"}],"wp:attachment":[{"href":"https:\/\/bryanlopez.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=953"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bryanlopez.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=953"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bryanlopez.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=953"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}