You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/docs/cloudflare-one/applications/scan-apps/manage-findings.mdx
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ head:
8
8
content: Manage security findings
9
9
---
10
10
11
-
Findings are security issues detected within SaaS applications that involve users, data at rest, and other configuration settings. With Cloudflare CASB, you can review a comprehensive list of findings in Zero Trust and immediately start taking action on the issues found.
11
+
Findings are security issues detected within SaaS and cloud applications that involve users, data at rest, and other configuration settings. With Cloudflare CASB, you can review a comprehensive list of findings in Zero Trust and immediately start taking action on the issues found.
12
12
13
13
## Prerequisites
14
14
@@ -55,11 +55,11 @@ You can change the severity level for a finding at any time, in case the default
55
55
2. Locate the finding you want to modify and select **View**.
56
56
3. In the severity level drop-down menu, choose your desired setting (_Critical_, _High_, _Medium_, or _Low_).
57
57
58
-
The new severity level will only apply to the finding within this specific integration. If you added multiple integrations of the same SaaS application, the other integrations will not be impacted by this change.
58
+
The new severity level will only apply to the finding within this specific integration. If you added multiple integrations of the same application, the other integrations will not be impacted by this change.
59
59
60
60
## Resolve finding with a Gateway policy
61
61
62
-
Using the security findings from CASB allows for fine-grained Gateway policies which prevent future unwanted behavior while still allowing usage that aligns to your company's security policy. This means going from viewing a CASB finding, like the use of an unapproved SaaS application, to preventing or controlling access in minutes.
62
+
Using the security findings from CASB allows for fine-grained Gateway policies which prevent future unwanted behavior while still allowing usage that aligns to your company's security policy. This means going from viewing a CASB finding, like the use of an unapproved application, to preventing or controlling access in minutes.
63
63
64
64
:::note[Before you begin]
65
65
@@ -73,7 +73,7 @@ To create a Gateway policy directly from a CASB finding:
73
73
3. Find the instance you want to block and select its three-dot menu.
74
74
4. Select **Block with Gateway HTTP policy**. A new browser tab will open with a pre-filled HTTP policy.
75
75
:::note
76
-
Not all CASB findings will have the **Block with Gateway HTTP policy** option. Unsupported findings can only be resolved from your SaaS application dashboard or through your domain provider.
76
+
Not all CASB findings will have the **Block with Gateway HTTP policy** option. Unsupported findings can only be resolved from your application dashboard or through your domain provider.
77
77
:::
78
78
79
79
5. (Optional) [Customize the HTTP policy](/cloudflare-one/policies/gateway/http-policies/). For example, if the policy blocks an unsanctioned third-party app, you can apply the policy to some or all users, or only block uploads or downloads.
0 commit comments