Monitor the cloud apps in use in your environment with the App Discovery report. To effectively reduce the risk introduced by apps, a good approach is to look for a reduction over time in the number of DNS requests made by apps with high and very high-risk assessments. You can monitor this with the App Discovery report.
Many apps can be blocked by your policy when risk levels are unacceptable and/or an app category is inappropriate for your organization. For more information, see Block Apps.
To open the App Discovery report, navigate to Reporting > Core Reports > App Discovery.
App Discovery data is aggregated and processed once a day so it may take up to 24 hours for new data to populate in the report. Logging of traffic is required for App Discovery to function.
In App Discovery, the dashboard displays information about apps being used in your environment, beginning with the number of apps discovered in your environment, sorted by label. There are four labels:
- Unreviewed—The app has not yet been assigned any label.
- Under Audit—The app is currently being reviewed.
- Not Approved—The app should not be approved for use in your environment.
- Approved—The app may be used in your environment.
Once an app has been given a label, it cannot be set back to Unreviewed. You can use the Under Audit label for apps that still need review.
Labels do not affect policy settings
When you set an app to Not Approved, it is not automatically blocked from use. Labels within the App Discovery report are used to help review apps in your environment.
You must configure application settings within a policy to block apps. For more information, see Block Apps.
These cards show information about apps in the most sensitive categories. Cisco's Cloud Security researchers categorize apps according to function, source, and other factors. The categories of most interest (and most risk) are:
- Anonymizers—Services that provide an anonymous proxy tool that attempts to make activity on the Internet untraceable. Apps in this category can introduce data exfiltration risks.
- Cloud Storage—Applications that offer massively scalable storage capacity that can be used for applications, and file storage. Apps in this category can also be used for data exfiltration.
- Collaboration—Apps that may store sensitive data in unreliable services or unsecured environments.
- Games—Online and mobile games. While games are not notable for data exfiltration risks, some can be used as attractive ways to introduce malware.
- Media—Apps that can contribute to productivity loss and are frequently managed as unwanted bandwidth consumers.
- P2P—Peer to Peer torrents like apps and protocols. These apps can be used for data exfiltration.
- Social Networking—Can be used to transmit sensitive data as well as contribute to productivity loss.
Up to three cards can be shown at once.
For a complete list of application categories, see Application Categories.
These cards present apps that have been flagged based on their risk group. Risk groups differ from the regular set of application categories.
Dismissing a flagged app card hides it from the overview. It does not label or block the app.
This chart shows the total number of DNS requests for apps discovered in the past 30 days. Umbrella assigns a risk score to apps, based on several factors. The DNS requests made by a high-risk app can be considered more problematic than the same number of requests made by an app with a lower risk score.
The chart can be filtered by label and risk.
By toggling the buttons in the upper right, you can also switch the chart to review Traffic (bytes in and out) by App Risk for the last 30 days.
You have the option from the drop-down to view All Traffic, Outbound Traffic or Inbound Traffic. This chart can also be filtered by label and risk.
This chart presents the top 10 categories of discovered apps, sorted by risk. The chart can be filtered by label and risk. Clicking a bar on the chart opens the App Grid for apps in the selected category.
Updated 3 days ago