You are implementing MCAS.
Which of the following data sources can be used for discovery of Shadow IT? (Choose three.)
A. Log collector
B. Data Gateway
C. Secure Web Gateway
D. Defender ATP
E. Azure Sentinel
You are implementing MCAS.
Which of the following data sources can be used for discovery of Shadow IT? (Choose three.)
A. Log collector
B. Data Gateway
C. Secure Web Gateway
D. Defender ATP
E. Azure Sentinel