Skip to content

Commit 84af769

Browse files
cdraper-cloudflarecrwaters16maxvp
authored
[ZT] Update analytics w/ overview page + Access (cloudflare#19087)
Co-authored-by: Claire W <[email protected]> Co-authored-by: Max Phillips <[email protected]>
1 parent be13e9e commit 84af769

File tree

11 files changed

+314
-171
lines changed

11 files changed

+314
-171
lines changed

public/_redirects

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1617,7 +1617,7 @@
16171617
/access/common-access-configurations/common-bypass/ /cloudflare-one/policies/access/#bypass 301
16181618
/cloudflare-one/analytics/ /cloudflare-one/insights/ 301
16191619
/cloudflare-one/analytics/logs/activity-log/ /cloudflare-one/insights/logs/gateway-logs/ 301
1620-
/cloudflare-one/analytics/private-network-discovery/ /cloudflare-one/insights/analytics/access/ 301
1620+
/cloudflare-one/analytics/private-network-discovery/ /cloudflare-one/insights/analytics/shadow-it-discovery/#private-network-origins 301
16211621
/cloudflare-one/analytics/access/ /cloudflare-one/insights/analytics/access/ 301
16221622
/cloudflare-one/analytics/gateway/ /cloudflare-one/insights/analytics/gateway/ 301
16231623
/cloudflare-one/analytics/users/ /cloudflare-one/insights/logs/users/ 301
@@ -1714,6 +1714,7 @@
17141714
/cloudflare-one/identity/idp-integration/saml-okta/ /cloudflare-one/identity/idp-integration/okta-saml/ 301
17151715
/cloudflare-one/identity/idp-integration/workspace-one/ /cloudflare-one/identity/devices/service-providers/workspace-one/ 301
17161716
/cloudflare-one/identity/login-page/ /cloudflare-one/applications/login-page/ 301
1717+
/cloudflare-one/insights/analytics/ /cloudflare-one/insights/analytics/analytics-overview/ 301
17171718
/cloudflare-one/insights/logs/logpush/rdata/ /cloudflare-one/insights/logs/logpush/#parse-logpush-logs 301
17181719
/cloudflare-one/applications/custom-pages/ /cloudflare-one/applications/ 301
17191720
/cloudflare-one/identity/service-auth/service-tokens/ /cloudflare-one/identity/service-tokens/ 301

src/content/docs/cloudflare-one/connections/connect-devices/warp/index.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,5 +16,5 @@ Here are a few ways in which the WARP client provides in-depth protection for yo
1616

1717
- **WARP lets you enforce security policies anywhere**. With the WARP client deployed in the Gateway with WARP mode, Gateway policies are not location-dependent — they can be enforced anywhere.
1818
- **WARP lets you enforce HTTP filtering and user-based policies**. Download and install the WARP client to enable Gateway features such as [Anti-Virus scanning](/cloudflare-one/policies/gateway/http-policies/antivirus-scanning/), [HTTP filtering](/cloudflare-one/policies/gateway/http-policies/), [Browser Isolation](/cloudflare-one/policies/gateway/http-policies/#isolate), and [identity-based policies](/cloudflare-one/policies/gateway/network-policies/).
19-
- **WARP lets you have in-depth, application-specific insights**. With WARP installed on your corporate devices, you can populate the [Zero Trust Shadow IT Discovery](/cloudflare-one/insights/analytics/access/) page with visibility down to the application and user level. This makes it easy to discover, analyze, and take action on any shadow IT your users may be using every day.
19+
- **WARP lets you have in-depth, application-specific insights**. With WARP installed on your corporate devices, you can populate the [Zero Trust Shadow IT Discovery](/cloudflare-one/insights/analytics/shadow-it-discovery/) page with visibility down to the application and user level. This makes it easy to discover, analyze, and take action on any shadow IT your users may be using every day.
2020
- **WARP allows you to build rich device posture rules.** The WARP client provides advanced Zero Trust protection by making it possible to check for [device posture](/cloudflare-one/identity/devices/). By setting up device posture checks, you can build Zero Trust policies that check for a device's location, disk encryption status, OS version, and more.
Lines changed: 21 additions & 95 deletions
Original file line numberDiff line numberDiff line change
@@ -1,110 +1,36 @@
11
---
22
pcx_content_type: reference
3-
title: Shadow IT Discovery
3+
title: Access analytics
44
sidebar:
5-
order: 2
6-
5+
order: 3
76
---
87

9-
The Shadow IT Discovery page provides visibility into the SaaS applications and private network origins your end users are visiting. This information allows you to create identity and device-driven Zero Trust policies to secure your users and data.
10-
11-
Shadow IT Discovery is located in [Zero Trust](https://one.dash.cloudflare.com) under **Analytics** > **Access**.
12-
13-
## Turn on Shadow IT Discovery
14-
15-
To allow Zero Trust to discover shadow IT in your traffic:
16-
17-
* Turn on the [Gateway proxy](/cloudflare-one/policies/gateway/proxy/) for HTTP and network traffic.
18-
* Turn on [TLS decryption](/cloudflare-one/policies/gateway/http-policies/tls-decryption/) to inspect HTTPS traffic.
19-
* Ensure any network traffic you want to inspect is not routed around Gateway by a [Split Tunnel](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/split-tunnels/).
20-
21-
## SaaS applications
22-
23-
To see an overview of SaaS applications your users have visited, go to **Analytics** > **Access** > **SaaS**. This tab displays the following information:
24-
25-
* **Unique application users**: Chart showing the number of different users who accessed SaaS applications over time.
26-
* **Top approved applications**: SaaS applications marked as [**Approved**](#approval-status) which had the greatest number of unique visitors.
27-
* **Top unapproved applications**: SaaS applications marked as [**Unapproved**](#approval-status) which had the greatest number of unique visitors.
28-
* **Zero Trust**: Metrics for your Access applications including the total number of accessed applications, failed logins, and connected users over the selected time period.
29-
* **Logins**: Chart showing the number of logins for an individual Access application over time.
30-
* **Top applications accessed**: Access applications with the greatest number of logins.
31-
* **Top connected users**: Users who logged in to the greatest number of Access applications.
32-
33-
### Review discovered applications
34-
35-
You can view a list of all discovered SaaS applications and mark them as approved or unapproved. To review an application:
36-
37-
1. Go to **Analytics** > **Access** > **SaaS**.
38-
2. In the **Unique application users** chart, select **Review all**. The table displays the following fields:
39-
40-
41-
42-
| Field | Description |
43-
| ---------------- | ---------------------------------------------------------------------------------------------------------------------------- |
44-
| Application | SaaS application's name and logo. |
45-
| Application type | [Application type](/cloudflare-one/policies/gateway/application-app-types/#app-types) assigned by Cloudflare Zero Trust. |
46-
| Status | Application's [approval status](#approval-status). |
47-
| Secured | Whether the application is currently secured behind Cloudflare Access. |
48-
| Users | Number of users who connected to the application over the period of time specified on the Shadow IT Discovery overview page. |
49-
| | |
50-
51-
3. Select a specific application to view details.
52-
4. Assign a new [approval status](#approval-status) according to your organization's preferences.
53-
54-
The application's status will now be updated across charts and visualizations on the **SaaS** tab. You can block unapproved applications by creating a [Gateway policy](/cloudflare-one/policies/gateway/).
55-
56-
## Private network origins
57-
58-
To see an overview of the private network origins your users have visited, go to **Analytics** > **Access** > **Private Network**. This tab displays the following information:
59-
60-
* **Unique origin users**: Chart showing the number of different users accessing your private network over time.
61-
* **Top approved origins**: Origins marked as [**Approved**](#approval-status) which had the greatest number of unique visitors.
62-
* **Top unapproved origins**: Origins marked as [**Unapproved**](#approval-status) which had the greatest number of unique visitors.
63-
* **Zero Trust**: Metrics for your Access applications including the total number of accessed applications, failed logins, and connected users over the selected time period.
64-
* **Logins**: Chart showing the number of logins for an individual Access application over time.
65-
* **Top applications accessed**: Access applications with the greatest number of logins.
66-
* **Top connected users**: Users who logged in to the greatest number of Access applications.
67-
68-
### Review discovered origins
69-
70-
You can view a list of all discovered origins and mark them as approved or unapproved. To review a private network origin:
71-
72-
1. Go to **Analytics** > **Access** > **Private Network**.
73-
2. In the **Unique origin users** chart, select **Review all**. The discovered origins that appear on this page are defined by unique combinations of IP address, port, and protocol.
74-
75-
76-
77-
| Field | Description |
78-
| ---------- | ----------------------------------------------------------------------------------------------------------------------- |
79-
| IP address | Origin's internal IP address in your private network. |
80-
| Port | Port used to connect to the origin. |
81-
| Protocol | Protocol used to connect to the origin. |
82-
| Hostname | Hostname used to access the origin. |
83-
| Status | Origin's [approval status](#approval-status) |
84-
| Users | Number of users who connected to the origin over the period of time specified on the Shadow IT Discovery overview page. |
85-
86-
8+
Access analytics provide Cloudflare One users with data on how Access is protecting their network.
879

88-
3. Select a specific origin to view details.
89-
4. Assign a new [approval status](#approval-status) according to your organization's preferences.
10+
To view Access analytics in [Zero Trust](https://one.dash.cloudflare.com), go to **Analytics**, then select **Access**.
9011

91-
The origin's status will now be updated across charts and visualizations on the **Private Network** tab. You can block unapproved origins by creating a [Gateway policy](/cloudflare-one/policies/gateway/).
12+
You can view the following data and filters in Access analytics:
9213

93-
## Approval status
14+
**Zero Trust data:**
9415

95-
Within Shadow IT Discovery, applications are labeled according to their status. The default status for a discovered application is **Unreviewed**. Your organization can determine the status of each application and change their status at any time.
16+
- Applications accessed
17+
- Failed logins
18+
- Connected users
9619

97-
:::note
20+
**Logins over time:**
9821

99-
Approval status does not impact a user's ability to access the application. Users are allowed or blocked according to your Access and Gateway policies.
100-
:::
22+
- Total count of all logins per day
23+
- Filter to see logins for a specific application
10124

25+
**Applications and users:**
10226

27+
- Top applications accessed
28+
- Top connected users
10329

104-
| Status | Description |
105-
| ---------- | ------------------------------------------------------------------------------------------------------ |
106-
| Approved | Applications that have been marked as sanctioned by your organization. |
107-
| Unapproved | Applications that have been marked as unsanctioned by your organization. |
108-
| In review | Applications in the process of being reviewed by your organization. |
109-
| Unreviewed | Unknown applications that are neither sanctioned nor being reviewed by your organization at this time. |
30+
**Time filters:**
11031

32+
- Last hour
33+
- Last 24 hours
34+
- Last 7 days
35+
- Last 30 days
36+
- Current calendar month
Lines changed: 121 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,121 @@
1+
---
2+
pcx_content_type: reference
3+
title: Analytics overview
4+
sidebar:
5+
order: 2
6+
---
7+
8+
The Cloudflare One Analytics overview provides a dashboard that reports on how Cloudflare One is protecting your organization and networks.
9+
10+
To view the Analytics overview in [Zero Trust](https://one.dash.cloudflare.com), go to **Analytics**.
11+
12+
The Analytics overview includes reports and insights across the following products and categories:
13+
14+
- [Global status](#global-status) of your Cloudflare One organization
15+
- [Access](#access)
16+
- Gateway
17+
- [HTTP traffic](#proxy-traffic)
18+
- [Network traffic](#gateway-network-requests)
19+
- [DNS traffic](#dns-traffic)
20+
- [Firewall policies](#gateway-insights)
21+
22+
## Global status
23+
24+
In **Global status**, you can view a report on your organization's Cloudflare One adoption that contains the following metrics:
25+
26+
- Access apps configured
27+
- Gateway HTTP policies
28+
- Gateway network policies
29+
- Gateway DNS policies
30+
- SaaS integrations
31+
- DLP profiles
32+
33+
You can also view a report on your [seat usage](/cloudflare-one/identity/users/seat-management/) across your Cloudflare One organization that contains the following metrics:
34+
35+
- Total seats
36+
- Used seats
37+
- Unused seats
38+
39+
## Access
40+
41+
In **Access**, you can view a report on your Access configuration that contains:
42+
43+
**Metrics:**
44+
45+
- Total access attempts
46+
- Granted access
47+
- Denied (policy violation)
48+
- Active logins overtime
49+
- Top applications with most logins
50+
51+
**Filters:**
52+
53+
- Access data by country
54+
55+
## Gateway
56+
57+
### Proxy traffic
58+
59+
In **Proxy traffic**, you can view a report on your Gateway HTTP traffic that contains:
60+
61+
**Metrics:**
62+
63+
- Total requests overtime
64+
- Allowed requests
65+
- Blocked requests
66+
- Isolated requests
67+
- Do not inspect requests
68+
- Top bandwidth consumers (GB)
69+
- Top denied users
70+
71+
**Filters:**
72+
73+
- Gateway HTTP traffic data by country
74+
75+
### Gateway (network requests)
76+
77+
In **Gateway (network requests)**, you can view a report on your Gateway network traffic that contains:
78+
79+
**Metrics:**
80+
81+
- Total sessions
82+
- Authenticated sessions
83+
- Blocked sessions
84+
- Audit SSH sessions
85+
- Allowed sessions
86+
- Override sessions
87+
- Top bandwidth consumers in GB
88+
- Top denied users
89+
90+
**Filters:**
91+
92+
- Gateway network traffic data by country
93+
94+
### DNS traffic
95+
96+
In **DNS traffic**, you can view a report on your Gateway DNS traffic that contains:
97+
98+
**Metrics:**
99+
100+
- Total DNS queries
101+
- Allowed DNS queries
102+
- Blocked DNS queries
103+
- Override DNS queries
104+
- Safe Search DNS queries
105+
- Restricted DNS queries
106+
- Other DNS queries
107+
108+
**Filters:**
109+
110+
- Gateway DNS traffic by query type
111+
- Gateway DNS traffic by country
112+
113+
### Gateway insights
114+
115+
In **Gateway insights**, you can view a report on your Gateway firewall policies that contains the following metrics:
116+
117+
- Top domain blocking policies
118+
- Top destination domains
119+
- Most user queries
120+
- Top devices
121+
- Top countries

src/content/docs/cloudflare-one/insights/analytics/gateway.mdx

Lines changed: 6 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,20 +1,16 @@
11
---
2-
pcx_content_type: concept
2+
pcx_content_type: reference
33
title: Gateway analytics
44
sidebar:
5-
order: 3
6-
5+
order: 4
76
---
87

98
To see the top Allowed and Blocked requests across all of your DNS locations, go to **Analytics** > **Gateway**. You can filter the data by selecting a specific location and/or time.
109

11-
* **Requests** — This chart shows an overview of the number of requests made by end users within the time period you specify. It shows a breakdown of requests based on the decision Gateway took (either Allowed or Blocked).
12-
13-
* **Allowed requests** — This chart shows a breakdown of the five domains which received the highest number of Allowed requests. It also shows the five domains which received the lowest amount of Allowed requests. By selecting **View all** to the right of either section of the chart, you will see a list of highest 100 and lowest 100 domains ranked by number of Allowed requests.
14-
15-
* **Top blocked requests** — This chart shows a breakdown of the five domains which received the highest number of Blocked requests. It also shows the five domains which received the lowest number of Blocked requests. By selecting **View all** to the right of either section of the chart, you'll see a list of highest 100 and lowest 100 domains ranked by number of Blocked requests.
16-
17-
* **Requests by category** — The charts in this card show a breakdown of the **Top allowed categories** and the **Top blocked categories** based on the number of requests that Gateway classified as belonging to a content category.
10+
- **Requests** — This chart shows an overview of the number of requests made by end users within the time period you specify. It shows a breakdown of requests based on the decision Gateway took (either Allowed or Blocked).
11+
- **Allowed requests** — This chart shows a breakdown of the five domains which received the highest number of Allowed requests. It also shows the five domains which received the lowest amount of Allowed requests. By selecting **View all** to the right of either section of the chart, you will see a list of highest 100 and lowest 100 domains ranked by number of Allowed requests.
12+
- **Top blocked requests** — This chart shows a breakdown of the five domains which received the highest number of Blocked requests. It also shows the five domains which received the lowest number of Blocked requests. By selecting **View all** to the right of either section of the chart, you'll see a list of highest 100 and lowest 100 domains ranked by number of Blocked requests.
13+
- **Requests by category** — The charts in this card show a breakdown of the **Top allowed categories** and the **Top blocked categories** based on the number of requests that Gateway classified as belonging to a content category.
1814

1915
## GraphQL queries
2016

0 commit comments

Comments
 (0)