One of the first things you did when setting
up
Data Security was
Define
Your Internal Domains to determine if the user is internal
to your organization. If an external user has an email address that
does not belong to an internal domain, you can use
Data Security to define users and domains as trusted or untrusted to protect
your assets and have better granular control over who has access.
After you define external users and domains,
Data Security reports
any assets shared inadvertently or maliciously.
Because the Trusted and Untrusted Users and Domains list applies to all cloud apps on Data Security, you must be an administrator with a Super Admin role or Admin with
access to all apps to modify this setting.