Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
---
pcx_content_type: reference
title: Application access report
title: Application Access Report
---

import { Render } from "~/components";
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -36,18 +36,18 @@ The SaaS and Cloud findings by count chart shows a time series view of Posture a

Each bar represents the total number of findings detected within a given time interval. You can use this view to observe patterns or spikes in findings over time. Hover over any bar to view the exact count of Posture and Content findings for that period.

To review findings in detail, log into [Zero Trust](https://one.dash.cloudflare.com) and go to **CASB** > **Posture Findings** or **Content Findings**.
To review findings in detail, log into [Cloudflare One](https://one.dash.cloudflare.com) and go to **Cloud & SaaS findings** > **Posture Findings** or **Content Findings**.

### Posture findings by Severity

The Posture findings by severity chart displays the distribution of CASB findings based on their [severity levels](/cloudflare-one/cloud-and-saas-findings/manage-findings/#severity-levels). Each segment of the circle represents the number of posture issues classified as `Critical`, `High`, `Medium`, or `Low`.

To review findings in detail, log into [Zero Trust](https://one.dash.cloudflare.com) and go to **CASB** > **Posture Findings**.
To review findings in detail, log into [Cloudflare One](https://one.dash.cloudflare.com) and go to **Cloud & SaaS findings** > **Posture Findings**.

### DLP matches in HTTP requests over time

The DLP matches in HTTP requests over time chart displays when [DLP policies](/cloudflare-one/data-loss-prevention/dlp-policies/) were triggered by users over a specified period of time.

Unlike the SaaS and Cloud findings by count chart above, which relies on CASB findings from data at rest, the DLP matches in HTTP requests over time chart reflects DLP detections in HTTP traffic — helping you monitor sensitive data movement in real time.

To review DLP detections in detail, log into [Zero Trust](https://one.dash.cloudflare.com) and go to **Logs** > **Gateway** > **HTTP**. Use the **DLP profiles** or **DLP match data** filters to view HTTP requests that triggered a DLP policy.
To review DLP detections in detail, log into [Cloudflare One](https://one.dash.cloudflare.com) and go to **Insights** > **Logs** > **HTTP request logs**. Use the **DLP profiles** or **DLP match data** filters to view HTTP requests that triggered a DLP policy.
21 changes: 18 additions & 3 deletions src/content/docs/cloudflare-one/insights/analytics/gateway.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -23,7 +23,12 @@ The HTTP request analytics dashboard is powered by your [Gateway HTTP policies](

The HTTP request analytics dashboard helps you identify trends in how your HTTP policies are applied over time. By visualizing allowed, isolated, and do not inspect requests, the dashboard provides insights into traffic behavior and policy trends, making it easier to spot anomalies or shifts in usage patterns.

To review a detailed description of an HTTP request and its associated policy, log in to [Zero Trust](https://one.dash.cloudflare.com/) and go to **Logs** > **Gateway** > **HTTP**.
To review a detailed description of an HTTP request and its associated policy:

1. In [Cloudflare One](https://one.dash.cloudflare.com), go to **Insights**.
2. Select **Logs**.
3. Select **HTTP request logs**.
4. Use the **Policy** filter to view HTTP requests that triggered a policy or other filters to narrow down your results.

### Provided analytics

Expand All @@ -42,7 +47,12 @@ The DNS query analytics dashboard is powered by your [Gateway DNS policies](/clo

The DNS query analytics dashboard helps you identify trends in how your DNS policies are applied over time. By visualizing allowed, blocked, and overridden queries, the dashboard provides insights into traffic behavior and policy trends, making it easier to spot anomalies or shifts in usage patterns.

To review a detailed description of a DNS query and its associated policy, log in to [Zero Trust](https://one.dash.cloudflare.com/) and go to **Logs** > **Gateway** > **DNS**.
To review a detailed description of a DNS query and its associated policy:

1. In [Cloudflare One](https://one.dash.cloudflare.com), go to **Insights**.
2. Select **Logs**.
3. Select **DNS query logs**.
4. Use the **Policy** filter to view DNS queries that triggered a policy or other filters to narrow down your results.

### Provided analytics

Expand All @@ -60,7 +70,12 @@ The Network session analytics dashboard is powered by your [Gateway network poli

The Network session analytics dashboard helps you identify trends in how your network policies are applied over time. By visualizing allowed, blocked, and overridden sessions, the dashboard provides insights into traffic behavior and policy trends, making it easier to spot anomalies or shifts in usage patterns.

To review a detailed description of a network session and its associated policy, log in to [Zero Trust](https://one.dash.cloudflare.com/) and go to **Logs** > **Gateway** > **Network**.
To review a detailed description of a network session and its associated policy:

1. In [Cloudflare One](https://one.dash.cloudflare.com), go to **Insights**.
2. Select **Logs**.
3. Select **Network logs**.
4. Use the **Policy** filter to view network sessions that triggered a policy or other filters to narrow down your results.

### Provided analytics

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@ sidebar:

import { Render } from "~/components";

Shadow IT SaaS analytics provides visibility into the SaaS applications your users are visiting. This information allows you to create identity and device-driven Zero Trust policies to secure your users and data.
Shadow IT SaaS analytics provides visibility into the SaaS applications your users are visiting. This information allows you to create identity and device-driven Cloudflare One policies to secure your users and data.

To access Shadow IT SaaS analytics:

Expand All @@ -34,7 +34,7 @@ Review the Shadow IT SaaS analytics dashboard for application usage. Filter the
| Field | Description |
| ---------------- | ---------------------------------------------------------------------------------------------------------------------------- |
| Application | SaaS application's name and logo. |
| Application type | [Application type](/cloudflare-one/traffic-policies/application-app-types/#app-types) assigned by Cloudflare Zero Trust. |
| Application type | [Application type](/cloudflare-one/traffic-policies/application-app-types/#app-types) assigned by Cloudflare Cloudflare One. |
| Status | Application's approval status. |
| Secured | Whether the application is currently secured behind Cloudflare Access. |
| Users | Number of users who connected to the application over the period of time specified on the Shadow IT Discovery overview page. |
Expand All @@ -51,9 +51,10 @@ After marking applications, you can create [HTTP policies](/cloudflare-one/traff

To create an HTTP status policy directly from Shadow IT Discovery:

1. In [Zero Trust](https://one.dash.cloudflare.com), go to **Analytics** > **Dashboards**, then select **Shadow IT: SaaS analytics**.
2. Select **Set application statuses**.
3. Select **Manage HTTP status policies**, then choose an application status and select **Create policy**.
1. In [Cloudflare One](https://one.dash.cloudflare.com), go to **Insights**.
2. Select **Dashboards** > **Shadow IT: SaaS analytics**.
3. Select **Set application statuses**.
4. Select **Manage HTTP status policies**, then choose an application status and select **Create policy**.

## Available insights

Expand Down
Loading