Remediate Third-Party Apps
You can view and assess third-party apps to determine if the potential security threats are real and, if so, you can Block or Restrict them and send notifications to users. In some cases you may determine that an identified app does not pose a real threat and can Approve it. Use the following workflow to drill down into an app and assess whether it poses a security threat.
- Select Explore > Third-Party apps. By default, all discoveries are listed as Unclassified until they are assessed by the admin. You may Approve or Block any third-party app in the list view or click an app in the Name column to view the details and then Approve, Block, or Restrict the app.
- You can filter third-party apps associated with a particular end user by clicking (ExplorePeople).
- Drill down into the details by clicking Name. This detailed view displays the metadata of the third-party app and the associated links and cloud apps so that you can get more context around them.
- After you understand the details, you can apply remediation.
There are several ways to remediate:
- To remediate one or more results, select the log entry and click Actions, and then click either Allow or Block.
- To filter the users accessing a specific third-party app and apply remediation, click Name on the log entry and then Manage User Permissions, select All, Inactive, or Active.
- To filter the results by third-party app status, select Approved, Restricted, Blocked,
or Unclassified.When an app is either blocked or restricted, the user is sent an email to notify them of their access status.
(Optional)To download a spreadsheet of the third-party list for closer inspection, click .
- Approved the third-party app is accessible by all users.
- Restricted the third-party app is accessible for certain users you define, and blocked for all other users.
- Blocked all users are blocked access to the third-party app.
- Unclassified the admin has not assessed the third-party app.
View Information for Third-Party Apps
View Information for Third-Party Apps The Aperture service starts scanning third-party apps and lists all discoveries in the third-party apps log. The default action is ...
Configure Third-Party App Settings
Configure Third-Party App Settings Aperture third-party app settings gives you the controls to monitor third-party apps added by end users to an application ecosystem. Aperture ...
Remediate Issues The Palo Alto Networks® Aperture™ service provides detailed information about the incidents it detects as it scans assets in your managed SaaS applications. ...
Add a New Setting for Third-Party Apps
Add a New Setting for Third-Party Apps To add a new setting for third-party apps: Add a new setting. Select Explore Third-Party Apps Settings & ...
Deploy the GlobalProtect App for Android on Managed Chromebooks Using the Google Admin Console
Deploy the GlobalProtect App for Android on Managed Chromebooks Using the Google Admin Console The Google Admin console enables you to manage Chromebook settings and ...
Begin Scanning Third-Party Apps on the G Suite Marketplace
Begin Scanning Third-Party Apps on the G Suite Marketplace Before you begin scanning third-party apps, you must create a service account and enable Administrator and ...
Aperture service focuses on Content Security, User Activity Monitoring, Security Configuration Controls and Third-Party App Integrations. ...
Aperture Policy Aperture policy gives you the controls to manage assets, user activity, third-party apps and security controls across the different cloud SaaS and IaaS ...
Changes to Default Behavior in GlobalProtect App 4.0
Changes to Default Behavior in GlobalProtect App 4.0 The following are changes to default behavior that affect GlobalProtect app 4.0. For changes to default behavior ...