Skip to content

Commit 7396e2c

Browse files
[CF1] shadow IT update (#24387)
Co-authored-by: Max Phillips <[email protected]>
1 parent 387a18e commit 7396e2c

File tree

8 files changed

+153
-94
lines changed

8 files changed

+153
-94
lines changed

src/content/docs/cloudflare-one/applications/app-library.mdx

Lines changed: 5 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,8 @@ The Application Library allows users to manage their SaaS applications in Cloudf
1111

1212
To access the App Library in [Zero Trust](https://one.dash.cloudflare.com/), go to **My team** > **App Library**. Each application card will list the number of hostnames associated with the application, the supported Zero Trust product usage, and the [app type](/cloudflare-one/policies/gateway/application-app-types/#app-types).
1313

14+
The App Library groups [Do Not Inspect applications](/cloudflare-one/policies/gateway/application-app-types/#do-not-inspect-applications) within the corresponding application. For example, the App Library will group _Google Drive (Do Not Inspect)_ under **Google Drive**. Traffic that does not match a known application will not be included in the App Library.
15+
1416
## View application details
1517

1618
Select an application card to view details about the application.
@@ -20,7 +22,7 @@ Select an application card to view details about the application.
2022
The **Overview** tab shows details about an application, including:
2123

2224
- Name
23-
- Shadow IT [review status](/cloudflare-one/insights/analytics/shadow-it-discovery/#approval-status)
25+
- Shadow IT [review status](#review-applications)
2426
- Number of hostnames
2527
- [App type](/cloudflare-one/policies/gateway/application-app-types/#app-types)
2628
- Supported Zero Trust applications
@@ -42,14 +44,6 @@ The Shadow IT Discovery dashboard will provide more details for discovered appli
4244

4345
## Review applications
4446

45-
To organize applications into their approval status for your organization, you can mark them as **Unreviewed** (default), **In review**, **Approved**, and **Unapproved**. The App Library synchronizes application review statuses with [approval statuses](/cloudflare-one/insights/analytics/shadow-it-discovery/#approval-status) from Shadow IT Discovery.
46-
47-
<Render file="approval-status-block" product="cloudflare-one" />
48-
49-
To set the status of an application:
50-
51-
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **My team** > **App Library**.
52-
2. Locate the card for the application.
53-
3. In the three-dot menu, select the option to mark your desired status.
47+
The App Library synchronizes application review statuses with approval statuses from the [Shadow IT Discovery SaaS analytics](/cloudflare-one/insights/analytics/shadow-it-discovery/) dashboard.
5448

55-
Once you mark the status of an application, its badge will change. You can filter applications by their status to review each application in the list for your organization.
49+
<Render file="app-library-review-apps" />
Lines changed: 34 additions & 73 deletions
Original file line numberDiff line numberDiff line change
@@ -1,100 +1,61 @@
11
---
22
pcx_content_type: reference
3-
title: Shadow IT Discovery
3+
title: Shadow IT SaaS analytics
44
sidebar:
55
order: 5
66
---
77

88
import { Render } from "~/components";
99

10-
Shadow IT Discovery provides visibility into the SaaS applications and private network origins your users are visiting. This information allows you to create identity and device-driven Zero Trust policies to secure your users and data.
10+
Shadow IT SaaS analytics provides visibility into the SaaS applications your users are visiting. This information allows you to create identity and device-driven Zero Trust policies to secure your users and data.
1111

12-
To view Shadow IT Discovery in [Zero Trust](https://one.dash.cloudflare.com), go to **Analytics**, then select **Shadow IT Discovery**.
12+
To access Shadow IT SaaS analytics, in [Zero Trust](https://one.dash.cloudflare.com), go to **Analytics** > **Dashboards**, then select **Shadow IT: SaaS analytics**.
1313

14-
## Turn on Shadow IT Discovery
14+
## Prerequisites
1515

16-
To allow Zero Trust to discover shadow IT in your traffic:
16+
To allow Cloudflare to discover shadow IT in your traffic, you must set up [HTTP filtering](/cloudflare-one/policies/gateway/initial-setup/http/).
1717

18-
- Turn on the [Gateway proxy](/cloudflare-one/policies/gateway/proxy/) for HTTP and network traffic.
19-
- Turn on [TLS decryption](/cloudflare-one/policies/gateway/http-policies/tls-decryption/) to inspect HTTPS traffic.
20-
- Ensure any network traffic you want to inspect is not routed around Gateway by a [Split Tunnel](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/split-tunnels/).
18+
## Use Shadow IT SaaS analytics
2119

22-
## SaaS applications
20+
### 1. Review applications
2321

24-
For an overview of SaaS applications your users have visited, go to **Analytics** > **Access** > **SaaS**. This tab displays the following information:
22+
The first step in using the Shadow IT SaaS analytics dashboard is to review applications in the [Application Library](/cloudflare-one/applications/app-library/). The App Library synchronizes application review statuses with approval statuses from the Shadow IT Discovery SaaS analytics dashboard.
2523

26-
- **Unique application users**: Chart showing the number of different users who accessed SaaS applications over time.
27-
- **Top approved applications**: SaaS applications marked as [**Approved**](#approval-status) which had the greatest number of unique visitors.
28-
- **Top unapproved applications**: SaaS applications marked as [**Unapproved**](#approval-status) which had the greatest number of unique visitors.
29-
- **Zero Trust**: Metrics for your Access applications including the total number of accessed applications, failed logins, and connected users over the selected time period.
30-
- **Logins**: Chart showing the number of logins for an individual Access application over time.
31-
- **Top applications accessed**: Access applications with the greatest number of logins.
32-
- **Top connected users**: Users who logged in to the greatest number of Access applications.
24+
<Render file="app-library-review-apps" />
3325

34-
### Review discovered applications
26+
### 2. Monitor usage
3527

36-
You can view a list of all discovered SaaS applications and mark them as approved or unapproved. To review an application:
28+
Review the Shadow IT SaaS analytics dashboard for application usage. Filter the view based on:
3729

38-
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **Analytics**, then select **Shadow IT Discovery**
39-
2. Go to **SaaS**.
40-
3. In the **Unique application users** chart, select **Review all**. The table displays the following fields:
30+
| Field | Description |
31+
| ---------------- | ---------------------------------------------------------------------------------------------------------------------------- |
32+
| Application | SaaS application's name and logo. |
33+
| Application type | [Application type](/cloudflare-one/policies/gateway/application-app-types/#app-types) assigned by Cloudflare Zero Trust. |
34+
| Status | Application's approval status. |
35+
| Secured | Whether the application is currently secured behind Cloudflare Access. |
36+
| Users | Number of users who connected to the application over the period of time specified on the Shadow IT Discovery overview page. |
4137

42-
| Field | Description |
43-
| ---------------- | ---------------------------------------------------------------------------------------------------------------------------- |
44-
| Application | SaaS application's name and logo. |
45-
| Application type | [Application type](/cloudflare-one/policies/gateway/application-app-types/#app-types) assigned by Cloudflare Zero Trust. |
46-
| Status | Application's [approval status](#approval-status). |
47-
| Secured | Whether the application is currently secured behind Cloudflare Access. |
48-
| Users | Number of users who connected to the application over the period of time specified on the Shadow IT Discovery overview page. |
38+
To manage application statuses in bulk, select **Set Application Statuses** to review applications your users commonly visit and update their approval statuses.
4939

50-
3. Select a specific application to view details.
51-
4. Assign a new [approval status](#approval-status) according to your organization's preferences.
40+
### 3. Create policies
5241

53-
The application's status will now be updated across charts and visualizations on the **SaaS** tab. You can block unapproved applications by creating a [Gateway policy](/cloudflare-one/policies/gateway/).
42+
After marking applications, you can create [HTTP policies](/cloudflare-one/policies/gateway/http-policies/) based on application review status. For example, you can create policies that:
5443

55-
## Private network origins
44+
- Launch all **Unreviewed** and **In review** applications in an [isolated browser](/cloudflare-one/policies/gateway/http-policies/common-policies/#1-isolate-unreviewed-or-in-review-applications).
45+
- [Block access](/cloudflare-one/policies/gateway/http-policies/common-policies/#2-block-unapproved-applications) to all **Unapproved** applications.
46+
- Limit file upload capabilities for specific application statuses.
5647

57-
To see an overview of the private network origins your users have visited, go to **Analytics** > **Access** > **Private Network**. This tab displays the following information:
48+
To create an HTTP status policy directly from Shadow IT Discovery:
5849

59-
- **Unique origin users**: Chart showing the number of different users accessing your private network over time.
60-
- **Top approved origins**: Origins marked as [**Approved**](#approval-status) which had the greatest number of unique visitors.
61-
- **Top unapproved origins**: Origins marked as [**Unapproved**](#approval-status) which had the greatest number of unique visitors.
62-
- **Zero Trust**: Metrics for your Access applications including the total number of accessed applications, failed logins, and connected users over the selected time period.
63-
- **Logins**: Chart showing the number of logins for an individual Access application over time.
64-
- **Top applications accessed**: Access applications with the greatest number of logins.
65-
- **Top connected users**: Users who logged in to the greatest number of Access applications.
50+
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **Analytics** > **Dashboards**, then select **Shadow IT: SaaS analytics**.
51+
2. Select **Set application statuses**.
52+
3. Select **Manage HTTP status policies**, then choose an application status and select **Create policy**.
6653

67-
### Review discovered origins
54+
## Available insights
6855

69-
You can view a list of all discovered origins and mark them as approved or unapproved. To review a private network origin:
56+
The Shadow IT SaaS analytics dashboard includes several insights to help you monitor and manage SaaS application usage.
7057

71-
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **Analytics**, then select **Shadow IT Discovery**
72-
2. Go to **Private Network**.
73-
3. In the **Unique origin users** chart, select **Review all**. The discovered origins that appear on this page are defined by unique combinations of IP address, port, and protocol.
74-
75-
| Field | Description |
76-
| ---------- | ----------------------------------------------------------------------------------------------------------------------- |
77-
| IP address | Origin's internal IP address in your private network. |
78-
| Port | Port used to connect to the origin. |
79-
| Protocol | Protocol used to connect to the origin. |
80-
| Hostname | Hostname used to access the origin. |
81-
| Status | Origin's [approval status](#approval-status) |
82-
| Users | Number of users who connected to the origin over the period of time specified on the Shadow IT Discovery overview page. |
83-
84-
3. Select a specific origin to view details.
85-
4. Assign a new [approval status](#approval-status) according to your organization's preferences.
86-
87-
The origin's status will now be updated across charts and visualizations on the **Private Network** tab. You can block unapproved origins by creating a [Gateway policy](/cloudflare-one/policies/gateway/).
88-
89-
## Approval status
90-
91-
Within Shadow IT Discovery, applications are labeled according to their status. The default status for a discovered application is **Unreviewed**. Your organization can determine the status of each application and change their status at any time.
92-
93-
<Render file="approval-status-block" product="cloudflare-one" />
94-
95-
| Status | Description |
96-
| ---------- | ------------------------------------------------------------------------------------------------------ |
97-
| Approved | Applications that have been marked as sanctioned by your organization. |
98-
| Unapproved | Applications that have been marked as unsanctioned by your organization. |
99-
| In review | Applications in the process of being reviewed by your organization. |
100-
| Unreviewed | Unknown applications that are neither sanctioned nor being reviewed by your organization at this time. |
58+
- **Number of applications by status**: A breakdown of how many applications have been categorized into each [approval status](#1-review-applications). The list of applications is available in the [App Library](/cloudflare-one/applications/app-library/).
59+
- **Data transferred per application status**: A time-series graph showing the amount of data (in gigabytes) transferred to an application in the given status.
60+
- **User count per application status**: A time-series graph showing the number of users who have interacted with at least one application in a given status. For example, a user can use an **Approved** application shortly followed by an **In review** application, contributing to counts for both of those statuses.
61+
- **Top-N metrics**: A collection of metrics providing insights into top applications, users, devices, and countries.

src/content/docs/cloudflare-one/policies/gateway/application-app-types.mdx

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,8 @@ Gateway allows you to create DNS, Network, and HTTP policies based on applicatio
1313

1414
When you choose the _Application_ selector in a Gateway policy builder, the **Value** field will include all supported applications and their respective app types. Alternatively, you can use the [Gateway API](/api/resources/zero_trust/subresources/gateway/subresources/app_types/methods/list/) to fetch a list of applications, app types, and ID numbers.
1515

16+
To manage a consolidated list of applications across Zero Trust, you can use the [Application Library](/cloudflare-one/applications/app-library/).
17+
1618
## App types
1719

1820
Gateway sorts applications into the following app type groups:
@@ -57,8 +59,9 @@ To ensure Gateway evaluates traffic with your desired precedence, order your mos
5759

5860
Gateway automatically groups applications incompatible with TLS decryption into the _Do Not Inspect_ app type. As Cloudflare identifies incompatible applications, Gateway will periodically update this app type to add new applications. To ensure Gateway does not intercept any current or future incompatible traffic, you can [create a Do Not Inspect HTTP policy](/cloudflare-one/policies/gateway/http-policies/#do-not-inspect) with the entire _Do Not Inspect_ app type selected.
5961

60-
:::note[Install Cloudflare certificate manually to allow TLS decryption]
62+
When managing applications with the [Application Library](/cloudflare-one/applications/app-library/), Do Not Inspect applications will appear under the corresponding application. For example, the App Library will group _Google Drive (Do Not Inspect)_ under **Google Drive**.
6163

64+
:::note[Install Cloudflare certificate manually to allow TLS decryption]
6265
Instead of creating a Do Not Inspect policy for an application, you may be able to configure the application to [trust a Cloudflare certificate](/cloudflare-one/connections/connect-devices/user-side-certificates/manual-deployment/#add-the-certificate-to-applications). Doing so will allow the application to function without losing visibility into your traffic.
6366
:::
6467

src/content/docs/cloudflare-one/policies/gateway/http-policies/common-policies.mdx

Lines changed: 72 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -291,6 +291,78 @@ When accessing origin servers with certificates not signed by a public certifica
291291

292292
For more information on supported file types, refer to [Download and Upload File Types](/cloudflare-one/policies/gateway/http-policies/#download-and-upload-file-types).
293293

294+
## Isolate or block shadow IT applications
295+
296+
Isolate shadow IT applications discovered by the [Application Library](/cloudflare-one/applications/app-library/) that have not been reviewed yet or are currently under review, and block applications that are not approved by your organization.
297+
298+
For more information on reviewing shadow IT applications, refer to [Review applications](/cloudflare-one/applications/app-library/#review-applications).
299+
300+
### 1. Isolate unreviewed or in review applications
301+
302+
Isolate applications if their approval status is _Unreviewed_ or _In review_.
303+
304+
<Tabs syncKey="dashPlusAPI"> <TabItem label="Dashboard">
305+
306+
| Selector | Operator | Value | Logic | Action |
307+
| ------------------ | -------- | ------------ | ----- | ------- |
308+
| Application Status | is | _Unreviewed_ | Or | Isolate |
309+
| Application Status | is | _In review_ | | |
310+
311+
</TabItem>
312+
313+
<TabItem label="API">
314+
315+
<APIRequest
316+
path="/accounts/{account_id}/gateway/rules"
317+
method="POST"
318+
json={{
319+
name: "Isolate unreviewed or in review application status",
320+
description:
321+
"Isolate Shadow IT applications that have not been reviewed or are in review in the Application Library",
322+
enabled: true,
323+
action: "isolate",
324+
filters: ["http"],
325+
traffic:
326+
'any(app.statuses[*] == "unreviewed") or any(app.statuses[*] == "in review")',
327+
identity: "",
328+
device_posture: "",
329+
}}
330+
/>
331+
332+
</TabItem> </Tabs>
333+
334+
### 2. Block unapproved applications
335+
336+
Block applications if their approval status is _Unapproved_.
337+
338+
<Tabs syncKey="dashPlusAPI"> <TabItem label="Dashboard">
339+
340+
| Selector | Operator | Value | Action |
341+
| ------------------ | -------- | ------------ | ------ |
342+
| Application Status | is | _Unapproved_ | Block |
343+
344+
</TabItem>
345+
346+
<TabItem label="API">
347+
348+
<APIRequest
349+
path="/accounts/{account_id}/gateway/rules"
350+
method="POST"
351+
json={{
352+
name: "Block unapproved application status",
353+
description:
354+
"Block Shadow IT applications that have been marked as unapproved in the Application Library",
355+
enabled: true,
356+
action: "block",
357+
filters: ["http"],
358+
traffic: 'any(app.statuses[*] == "unapproved")',
359+
identity: "",
360+
device_posture: "",
361+
}}
362+
/>
363+
364+
</TabItem> </Tabs>
365+
294366
## Block Google services
295367

296368
To enable Gateway inspection for Google Drive traffic, you must [add a Cloudflare certificate to Google Drive](/cloudflare-one/connections/connect-devices/user-side-certificates/manual-deployment/#google-drive).

0 commit comments

Comments
 (0)