You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/docs/cloudflare-one/applications/scan-apps/manage-findings.mdx
+38-29Lines changed: 38 additions & 29 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,61 +15,70 @@ Findings are security issues detected within SaaS and cloud applications that in
15
15
- You have [added](/cloudflare-one/applications/scan-apps/#add-an-integration) a CASB integration.
16
16
- Your scan has surfaced at least one security finding.
17
17
18
-
## View findings
18
+
## Posture findings
19
19
20
-
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **CASB** > **Findings**.
20
+
To view your posture findings:
21
21
22
-
You will see the findings detected across all integrations.
22
+
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **CASB** > **Posture findings**.
23
+
2. To switch between findings for your SaaS and cloud applications, choose **SaaS** or **Cloud**.
24
+
3. Select a finding to view its details.
23
25
24
-
2. To view details for an individual finding, select **View**.
26
+
CASB will display details about your posture findings, including the type, [severity level](#severity-levels), associated integration, and status.
25
27
26
-
The individual findings page shows all detected instances of the finding within a specific integration. You can expand an individual row to view details for a particular instance.
28
+
To resolve the finding, expand the remediation guide and follow the instructions. You can also [create an HTTP block policy](#resolve-finding-with-a-gateway-policy), update the finding's [severity level](#severity-levels), or [hide findings](#hide-findings) from view.
27
29
28
-
3. To resolve the finding, expand the **Remediation Guide** and follow the step-by-step instructions in the UI.
30
+
### Severity levels
29
31
30
-
Other actions you can take include [creating an HTTP block policy](#resolve-finding-with-a-gateway-policy), updating the finding's [severity level](#severity-levels), or [hiding irrelevant findings](#hide-findings) from view.
32
+
Cloudflare CASB labels each findingwith one of the following severity levels:
| Critical | Suggests the finding is something your team should act on today. |
37
+
| High | Suggests the finding is something your team should act on this week. |
38
+
| Medium | Suggests the finding should be reviewed sometime this month. |
39
+
| Low | Suggests the finding is informational or part of a scheduled review process. |
33
40
34
-
File findings for some integrations (such as [Microsoft 365](/cloudflare-one/applications/scan-apps/casb-integrations/microsoft-365/#file-sharing) and [Box](/cloudflare-one/applications/scan-apps/casb-integrations/box/#file-sharing)) may link to an inaccessible file. To access the actual shared file:
41
+
#### Change the severity level
35
42
36
-
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **CASB** > **Findings**.
37
-
2. Locate the individual finding, then select **View**.
38
-
3. In **Active Instances**, select the file name.
39
-
4. In **Shared Links**, select the linked file instance.
43
+
You can change the severity level for a finding at any time in case the default assignment does not suit your environment:
40
44
41
-
## Severity levels
45
+
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **CASB** > **Posture findings**.
46
+
2. Locate the finding you want to modify and select **Manage**.
47
+
3. In the severity level drop-down menu, choose your desired setting (_Critical_, _High_, _Medium_, or _Low_).
42
48
43
-
Cloudflare CASB labels each finding with one of the following severity levels:
49
+
The new severity level will only apply to the posture finding within this specific integration. If you added multiple integrations of the same application, the other integrations will not be impacted by this change.
44
50
45
-
-**Critical**: Suggests the finding is something your team should act on today.
46
-
-**High**: Suggests the finding is something your team should act on this week.
47
-
-**Medium**: Suggests the finding should be reviewed sometime this month.
48
-
-**Low**: Suggests the finding is informational or part of a scheduled review process.
51
+
## Content findings
49
52
50
-
### Change the severity level
53
+
To view your content findings:
51
54
52
-
You can change the severity level for a finding at any time, in case the default assignment does not suit your environment:
55
+
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **CASB** > **Posture findings**.
56
+
2. To switch between findings for your SaaS and cloud applications, choose **SaaS** or **Cloud**.
57
+
3. Select a finding to view its details.
53
58
54
-
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **CASB** > **Findings**.
55
-
2. Locate the finding you want to modify and select **View**.
56
-
3. In the severity level drop-down menu, choose your desired setting (_Critical_, _High_, _Medium_, or _Low_).
59
+
CASB will display details about your content findings, including the file name, number of DLP profiles matched, associated integration, and location.
60
+
61
+
## View shared files
62
+
63
+
File findings for some integrations (such as [Microsoft 365](/cloudflare-one/applications/scan-apps/casb-integrations/microsoft-365/#file-sharing) and [Box](/cloudflare-one/applications/scan-apps/casb-integrations/box/#file-sharing)) may link to an inaccessible file. To access the actual shared file:
57
64
58
-
The new severity level will only apply to the finding within this specific integration. If you added multiple integrations of the same application, the other integrations will not be impacted by this change.
65
+
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **CASB** > **Findings**.
66
+
2. Locate the individual finding, then select **Manage**.
67
+
3. In **Active Instances**, select the file name.
68
+
4. In **Shared Links**, select the linked file instance.
59
69
60
70
## Resolve finding with a Gateway policy
61
71
62
72
Using the security findings from CASB allows for fine-grained Gateway policies which prevent future unwanted behavior while still allowing usage that aligns to your company's security policy. This means going from viewing a CASB finding, like the use of an unapproved application, to preventing or controlling access in minutes.
63
73
64
74
:::note[Before you begin]
65
-
66
75
Ensure that you have [enabled HTTP filtering](/cloudflare-one/policies/gateway/initial-setup/http/) for your organization.
67
76
:::
68
77
69
78
To create a Gateway policy directly from a CASB finding:
70
79
71
80
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **CASB** > **Findings**.
72
-
2. Locate the finding you want to modify and select **View**.
81
+
2. Locate the finding you want to modify and select **Manage**.
73
82
3. Find the instance you want to block and select its three-dot menu.
74
83
4. Select **Block with Gateway HTTP policy**. A new browser tab will open with a pre-filled HTTP policy.
75
84
:::note
@@ -89,9 +98,9 @@ After reviewing your findings, you may decide that certain findings are not appl
89
98
90
99
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **CASB** > **Findings**.
91
100
2. In the **Active** tab, select the checkboxes for the findings you want to hide.
92
-
3. Select **Ignore**.
101
+
3. Select **Move to Ignore**.
93
102
94
-
The findings will be moved from **Active** to **Ignored**. CASB will continue to scan for these findings and report detections in the **Ignored** tab. You can move ignored findings back to the **Active**tab at any time.
103
+
The finding's status will change from **Active** to **Ignored**. CASB will continue to scan for these findings and report detections. You can change ignored findings back to **Active**with the same process at any time.
0 commit comments