the security challenges associated with the applications traversing
your network. Application Usage findings can help you to refine
your security policy to control unsanctioned and risky applications.
you see in this dashboard are apps with the sanctioned
tag; go to
see your sanctioned apps or to tag apps as sanctioned.
Usage data includes:
An overview of the applications
on your network, including risk, sanction status, bandwidth consumed,
and the top users of these applications.
Most used application types
Applications with the most data transfer
The top application types on your network
The most heavily used applications on your network
The users with the most applications
The users with the most data transfer
app is a container app, then the displayed statistics are a roll-up
of all the applications in the container. For example, gmail is
a container app (there is no app-id for gmail). It groups applications
such as gmail-posting, gmail-downloading, gmail-uploading, and so
forth. The risk score set for this container app is the highest
risk score found for the contained applications. All other metrics
are calculated by summing the values found for the contained applications.
Share, Download, and Schedule Reports for