Monitor the cloud apps in use in your environment with the App Discovery report. To effectively reduce the risk introduced by apps, a good approach is to look for a reduction over time in the number of DNS requests made by apps with high and very high-risk assessments. You can monitor this with the App Discovery report.
Many apps can be blocked by your policy when risk levels are unacceptable and/or an app category is inappropriate for your organization. For more information, see Block Apps.
To open the App Discovery report, navigate to Reporting > Core Reports > App Discovery.
App Discovery data is aggregated and processed once a day so it may take up to 24 hours for new data to populate in the report. Logging of traffic is required for App Discovery to function.
In App Discovery, the dashboard displays information about apps being used in your environment, beginning with the number of apps discovered in your environment, sorted by label. There are four labels:
- Unreviewed—The app has not yet been assigned any label.
- Under Audit—The app is currently being reviewed.
- Not Approved—The app should not be approved for use in your environment.
- Approved—The app may be used in your environment.
Once an app has been given a label, it cannot be set back to Unreviewed. You can use the Under Audit label for apps that still need review.
Labels do not affect policy settings
When you set an app to Not Approved, it is not automatically blocked from use. Labels within the App Discovery report are used to help review apps in your environment.
You must configure application settings within a policy to block apps. See Block Apps for more information.
These cards show information about apps in the most sensitive categories. Cisco's Cloud Security researchers categorize apps according to function, source, and other factors. The categories of most interest (and most risk) are:
- Anonymizers—Services that provide an anonymous proxy tool that attempts to make activity on the Internet untraceable. Apps in this category can introduce data exfiltration risks.
- Cloud Storage—Applications that offer massively scalable storage capacity that can be used for applications, and file storage. Apps in this category can also be used for data exfiltration.
- Collaboration—Apps that may store sensitive data in unreliable services or unsecured environments.
- Games—Online and mobile games. While games are not notable for data exfiltration risks, some can be used as attractive ways to introduce malware.
- Media—Apps that can contribute to productivity loss and are frequently managed as unwanted bandwidth consumers.
- P2P—Peer to Peer torrents like apps and protocols. These apps can be used for data exfiltration.
- Social Networking—Can be used to transmit sensitive data as well as contribute to productivity loss.
Up to three cards can be shown at once.
For a complete list of application categories, see Manage Application Categories.
These cards present apps that have been flagged based on their risk group. Risk groups differ from the regular set of application categories.
Dismissing a flagged app card hides it from the overview. It does not label or block the app.
This chart shows the total number of DNS requests of apps discovered in the past 30 days and can be filtered by label and risk. Within this period of time, you can view your aggregated risk over time and observe where spikes in risk or usage occur. To effectively reduce the risk introduced by apps, a good approach is to look for a reduction over time in the number of DNS requests made by apps with high and very high-risk assessments.
By hovering on a specific date you can drill down to the DNS traffic on that date for apps by risk:
Clicking on a specific date will open the App Grid and filter apps to the specific date selected:
This chart presents the top 10 categories of discovered apps, sorted by risk. The chart can be filtered by label and risk. Clicking a bar on the chart opens the App Grid for apps in the selected category.
Updated 9 days ago