View Asset Details
Focus
Focus
SaaS Security

View Asset Details

Table of Contents


View Asset Details

Learn about how Data Security displays detailed information about an asset violating a policy rule.
As Data Security scans your managed cloud apps and discovers content, you can view the details on the console. Select Data SecurityData Assets. This page provides context into the findings so you can Assess Incidents and Monitor and Investigate User Activity across these applications.
The details for each incident vary depending on:
  • Which cloud app retains the asset.
  • Whether the asset is a file or a container (for example, a folder or a repository).
  • The policy the asset violated.
  • How the asset is shared.
  • Whether users accessed the file or took other actions on the file.
Asset Detail Description
1
Details
Summarizes asset file name, file type, exposure on cloud app, owner, and last updated timestamp.
  • Cloud app—app in which the asset resides.
  • Exposure—exposure level of the asset.
  • Owner—owner of the asset.
  • File Owner’s Groups—groups used for group-based policy.
  • Created—date on which the asset was created.
  • Type—one of the following:
    • Specific file format—whether the asset is a supported file type.
    • OBJ—when C++ code is compiled, it results in an .obj file. Additionally, OBJ is used when file type is unrecognizable.
    • MSG—when the asset is a chat message.
  • Size—file size of the asset.
Actions
Lists available actions for an asset, depending on the cloud app and admin role permissions:
2
Incidents
Displays which data asset policy or policies that an asset violates, the date Data Security identified the incident, the status of the incident, and whether there have been previous incidents associated with the asset. From here you can Assign Incidents to Another Administrator.
3
Match Criteria
Displays the data pattern that the asset matched, number of occurrences, and date found. Administrators with Write access for Request Snippets in Common Services can view asset snippets to view any available details about the asset matching the data pattern.
For assets that match the WildFire Analysis rule, you can Use the WildFire Report to Track Down Threats.
4
Exposure Details
Details how the asset is exposed (Published to the web, accessible by a public URL, if sign-in is required, or the asset is exposed by a parent folder). You can View Details to access the asset URL, if available. Strike through text on attributes denotes no exposure.
Lists information about the users who most recently interacted with the file: Timestamp, event (for example, whether the user downloaded the file), username, IP address, and location. You can View all user activities to see details about this event and all other events associated with this file. Such information helps you investigate whether there is malicious or inappropriate access to the file.
5
Explore
Explore on Cloud App
Displays the asset tree, policy violations, and exposure level for a given asset. View the asset in the context of its file and folder hierarchy to help you identify risks and inherited exposure.
Displays a list of collaborators (members) to help you identify who has access to shared drives (Google Drive) or team folders (Dropbox) and inherited exposure.


xThanks for visiting https://docs.paloaltonetworks.com. To improve your experience when accessing content across our site, please add the domain to the allow list on your ad blocker application.