Skip to content

Commit 2bb99e7

Browse files
committed
Revamp instructions
1 parent bb61597 commit 2bb99e7

File tree

1 file changed

+38
-29
lines changed

1 file changed

+38
-29
lines changed

src/content/docs/cloudflare-one/applications/scan-apps/manage-findings.mdx

Lines changed: 38 additions & 29 deletions
Original file line numberDiff line numberDiff line change
@@ -15,61 +15,70 @@ Findings are security issues detected within SaaS and cloud applications that in
1515
- You have [added](/cloudflare-one/applications/scan-apps/#add-an-integration) a CASB integration.
1616
- Your scan has surfaced at least one security finding.
1717

18-
## View findings
18+
## Posture findings
1919

20-
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **CASB** > **Findings**.
20+
To view your posture findings:
2121

22-
You will see the findings detected across all integrations.
22+
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **CASB** > **Posture findings**.
23+
2. To switch between findings for your SaaS and cloud applications, choose **SaaS** or **Cloud**.
24+
3. Select a finding to view its details.
2325

24-
2. To view details for an individual finding, select **View**.
26+
CASB will display details about your posture findings, including the type, [severity level](#severity-levels), associated integration, and status.
2527

26-
The individual findings page shows all detected instances of the finding within a specific integration. You can expand an individual row to view details for a particular instance.
28+
To resolve the finding, expand the remediation guide and follow the instructions. You can also [create an HTTP block policy](#resolve-finding-with-a-gateway-policy), update the finding's [severity level](#severity-levels), or [hide findings](#hide-findings) from view.
2729

28-
3. To resolve the finding, expand the **Remediation Guide** and follow the step-by-step instructions in the UI.
30+
### Severity levels
2931

30-
Other actions you can take include [creating an HTTP block policy](#resolve-finding-with-a-gateway-policy), updating the finding's [severity level](#severity-levels), or [hiding irrelevant findings](#hide-findings) from view.
32+
Cloudflare CASB labels each finding with one of the following severity levels:
3133

32-
### View shared files
34+
| Severity level | Urgency |
35+
| -------------- | ---------------------------------------------------------------------------- |
36+
| Critical | Suggests the finding is something your team should act on today. |
37+
| High | Suggests the finding is something your team should act on this week. |
38+
| Medium | Suggests the finding should be reviewed sometime this month. |
39+
| Low | Suggests the finding is informational or part of a scheduled review process. |
3340

34-
File findings for some integrations (such as [Microsoft 365](/cloudflare-one/applications/scan-apps/casb-integrations/microsoft-365/#file-sharing) and [Box](/cloudflare-one/applications/scan-apps/casb-integrations/box/#file-sharing)) may link to an inaccessible file. To access the actual shared file:
41+
#### Change the severity level
3542

36-
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **CASB** > **Findings**.
37-
2. Locate the individual finding, then select **View**.
38-
3. In **Active Instances**, select the file name.
39-
4. In **Shared Links**, select the linked file instance.
43+
You can change the severity level for a finding at any time in case the default assignment does not suit your environment:
4044

41-
## Severity levels
45+
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **CASB** > **Posture findings**.
46+
2. Locate the finding you want to modify and select **Manage**.
47+
3. In the severity level drop-down menu, choose your desired setting (_Critical_, _High_, _Medium_, or _Low_).
4248

43-
Cloudflare CASB labels each finding with one of the following severity levels:
49+
The new severity level will only apply to the posture finding within this specific integration. If you added multiple integrations of the same application, the other integrations will not be impacted by this change.
4450

45-
- **Critical**: Suggests the finding is something your team should act on today.
46-
- **High**: Suggests the finding is something your team should act on this week.
47-
- **Medium**: Suggests the finding should be reviewed sometime this month.
48-
- **Low**: Suggests the finding is informational or part of a scheduled review process.
51+
## Content findings
4952

50-
### Change the severity level
53+
To view your content findings:
5154

52-
You can change the severity level for a finding at any time, in case the default assignment does not suit your environment:
55+
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **CASB** > **Posture findings**.
56+
2. To switch between findings for your SaaS and cloud applications, choose **SaaS** or **Cloud**.
57+
3. Select a finding to view its details.
5358

54-
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **CASB** > **Findings**.
55-
2. Locate the finding you want to modify and select **View**.
56-
3. In the severity level drop-down menu, choose your desired setting (_Critical_, _High_, _Medium_, or _Low_).
59+
CASB will display details about your content findings, including the file name, number of DLP profiles matched, associated integration, and location.
60+
61+
## View shared files
62+
63+
File findings for some integrations (such as [Microsoft 365](/cloudflare-one/applications/scan-apps/casb-integrations/microsoft-365/#file-sharing) and [Box](/cloudflare-one/applications/scan-apps/casb-integrations/box/#file-sharing)) may link to an inaccessible file. To access the actual shared file:
5764

58-
The new severity level will only apply to the finding within this specific integration. If you added multiple integrations of the same application, the other integrations will not be impacted by this change.
65+
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **CASB** > **Findings**.
66+
2. Locate the individual finding, then select **Manage**.
67+
3. In **Active Instances**, select the file name.
68+
4. In **Shared Links**, select the linked file instance.
5969

6070
## Resolve finding with a Gateway policy
6171

6272
Using the security findings from CASB allows for fine-grained Gateway policies which prevent future unwanted behavior while still allowing usage that aligns to your company's security policy. This means going from viewing a CASB finding, like the use of an unapproved application, to preventing or controlling access in minutes.
6373

6474
:::note[Before you begin]
65-
6675
Ensure that you have [enabled HTTP filtering](/cloudflare-one/policies/gateway/initial-setup/http/) for your organization.
6776
:::
6877

6978
To create a Gateway policy directly from a CASB finding:
7079

7180
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **CASB** > **Findings**.
72-
2. Locate the finding you want to modify and select **View**.
81+
2. Locate the finding you want to modify and select **Manage**.
7382
3. Find the instance you want to block and select its three-dot menu.
7483
4. Select **Block with Gateway HTTP policy**. A new browser tab will open with a pre-filled HTTP policy.
7584
:::note
@@ -89,9 +98,9 @@ After reviewing your findings, you may decide that certain findings are not appl
8998

9099
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **CASB** > **Findings**.
91100
2. In the **Active** tab, select the checkboxes for the findings you want to hide.
92-
3. Select **Ignore**.
101+
3. Select **Move to Ignore**.
93102

94-
The findings will be moved from **Active** to **Ignored**. CASB will continue to scan for these findings and report detections in the **Ignored** tab. You can move ignored findings back to the **Active** tab at any time.
103+
The finding's status will change from **Active** to **Ignored**. CASB will continue to scan for these findings and report detections. You can change ignored findings back to **Active** with the same process at any time.
95104

96105
### Hide an instance of a finding
97106

0 commit comments

Comments
 (0)