: Begin Scanning a Yammer App
Focus
Focus

Begin Scanning a Yammer App

Table of Contents

Begin Scanning a Yammer App

Authorize
Data Security
to connect to Yammer to scan all content shared within the app.
This app is currently not supported in the Cloud Management Console.
Use the following procedure to connect a Yammer app to
Data Security
and begin scanning assets.
Support for automated remediation capabilities varies by SaaS application.
  1. To add the SaaS application, go to
    Data Security
    Applications
    Add Application
    Yammer
    .
    1. Select the application and enter the email address and password for the account.
      • For Yammer the account must have Global Admin role privileges.
    2. Connect to Yammer Account
      .
      The application is added to the list of
      Cloud Apps
      on
      Data Security
      .
  2. (
    Optional
    ) Enter a descriptive name for the app instance.
    In the list of
    Cloud Apps
    , click application name and add a descriptive name so that you can identify this instance from any other instances of the same application.
  3. Add policy rules.
    When you add a cloud app,
    Data Security
    automatically scans the app against the default data patterns and displays any match occurrences. As a best practice, consider the business use of your applications to determine if you need to Add a New Asset Rule to look for incidents unique to Yammer.
  4. (
    Optional
    ) Configure or edit a data pattern.
    You can Configure Data Patterns to identify specific strings of text, characters, words, or patterns to make it possible to find all instances of text that match a data pattern you specify.
  5. To start scanning Yammer for incidents, go to
    Data Security
    Applications
    Yammer
    Enable Scanning
    .
    Data Security
    scans assets in the associated app and identifies possible incidents. Depending upon the number of users and assets, it might take some time to complete the process. However, as soon as you begin to see this information populating the
    Dashboard
    , you can begin to Assess Incidents.
  6. Monitor the results of the scan.
    As
    Data Security
    scans files and matches them against enabled policy rules, you can Monitor Scan Results on the Dashboard to verify that your policy rules are effective. Monitoring the progress of the scan during the discovery phase allows you to Fine-Tune Policy to modify the match criteria and ensure better results.

Recommended For You