Skip to content

Commit bb61597

Browse files
committed
Remove SaaS
1 parent be3d3bd commit bb61597

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

src/content/docs/cloudflare-one/applications/scan-apps/manage-findings.mdx

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ head:
88
content: Manage security findings
99
---
1010

11-
Findings are security issues detected within SaaS applications that involve users, data at rest, and other configuration settings. With Cloudflare CASB, you can review a comprehensive list of findings in Zero Trust and immediately start taking action on the issues found.
11+
Findings are security issues detected within SaaS and cloud applications that involve users, data at rest, and other configuration settings. With Cloudflare CASB, you can review a comprehensive list of findings in Zero Trust and immediately start taking action on the issues found.
1212

1313
## Prerequisites
1414

@@ -55,11 +55,11 @@ You can change the severity level for a finding at any time, in case the default
5555
2. Locate the finding you want to modify and select **View**.
5656
3. In the severity level drop-down menu, choose your desired setting (_Critical_, _High_, _Medium_, or _Low_).
5757

58-
The new severity level will only apply to the finding within this specific integration. If you added multiple integrations of the same SaaS application, the other integrations will not be impacted by this change.
58+
The new severity level will only apply to the finding within this specific integration. If you added multiple integrations of the same application, the other integrations will not be impacted by this change.
5959

6060
## Resolve finding with a Gateway policy
6161

62-
Using the security findings from CASB allows for fine-grained Gateway policies which prevent future unwanted behavior while still allowing usage that aligns to your company's security policy. This means going from viewing a CASB finding, like the use of an unapproved SaaS application, to preventing or controlling access in minutes.
62+
Using the security findings from CASB allows for fine-grained Gateway policies which prevent future unwanted behavior while still allowing usage that aligns to your company's security policy. This means going from viewing a CASB finding, like the use of an unapproved application, to preventing or controlling access in minutes.
6363

6464
:::note[Before you begin]
6565

@@ -73,7 +73,7 @@ To create a Gateway policy directly from a CASB finding:
7373
3. Find the instance you want to block and select its three-dot menu.
7474
4. Select **Block with Gateway HTTP policy**. A new browser tab will open with a pre-filled HTTP policy.
7575
:::note
76-
Not all CASB findings will have the **Block with Gateway HTTP policy** option. Unsupported findings can only be resolved from your SaaS application dashboard or through your domain provider.
76+
Not all CASB findings will have the **Block with Gateway HTTP policy** option. Unsupported findings can only be resolved from your application dashboard or through your domain provider.
7777
:::
7878

7979
5. (Optional) [Customize the HTTP policy](/cloudflare-one/policies/gateway/http-policies/). For example, if the policy blocks an unsanctioned third-party app, you can apply the policy to some or all users, or only block uploads or downloads.

0 commit comments

Comments
 (0)