As a customer service software solution, Zendesk holds the sensitive information to your organization. Any abuse of Zendesk by a malicious actor or any human error may expose your most critical assets and services to potential attacks.
Connecting Zendesk to Defender for Cloud Apps gives you improved insights into your Zendesk admin activities and provides threat detection for anomalous behavior.
Type | Name |
---|---|
Built-in anomaly detection policy | Activity from anonymous IP addresses Activity from infrequent country Activity from suspicious IP addresses Impossible travel Activity performed by terminated user (requires Microsoft Entra ID as IdP) Multiple failed login attempts Unusual administrative activities Unusual impersonated activities |
Activity policy | Built a customized policy by the Zendesk audit log |
For more information about creating policies, see Create a policy.
In addition to monitoring for potential threats, you can apply and automate the following Zendesk governance actions to remediate detected threats:
Type | Action |
---|---|
User governance | Notify user on alert (via Microsoft Entra ID) Require user to sign in again (via Microsoft Entra ID) Suspend user (via Microsoft Entra ID) |
For more information about remediating threats from apps, see Governing connected apps.
Connect Zendesk to automatically get security posture recommendations for Zendesk in Microsoft Secure Score. In Secure Score, select Recommended actions and filter by Product = Zendesk. For example, recommendations for Zendesk include:
For more information, see:
This section provides instructions for connecting Microsoft Defender for Cloud Apps to your existing Zendesk using the App Connector APIs. This connection gives you visibility into and control over your organization's Zendesk use.
Connecting Zendesk to Defender for Cloud Apps with a Zendesk user that is not an admin will result in a connection error.
The Zendesk user that is configuring the integration must always remain a Zendesk admin, even after the connector is installed.
Microsoft recommends using a short lived access token. Zendesk doesn't currently support short lived tokens. We recommend our customers refresh the token every 6 months as a security best practice. To refresh the access token, revoke the old token by following Revoke Token. Once the old token is revoked, create a new secret and reconnect the Zendesk connector as documented above.
System activities will be shown with the Zendesk account name.
The default rate limit is 200 requests per minute. To increase the rate limit, open a support ticket.
The maximum rate limit for every subscription is described here.
If you run into any problems, we're here to help. To get assistance or support for your product issue, please open a support ticket.