Generate the SaaS Application Usage Report
The SaaS Application Usage PDF report is a two-part report that is based on the notion of sanctioned and unsanctioned applications. A sanctioned application is an application that you formally approve for use on your network; a SaaS application is an application that has the characteristic SaaS=yes in the applications details page in ObjectsApplications, all other applications are considered as non-SaaS. To indicate that you have sanctioned a SaaS or non-SaaS application, you must tag it with the new predefined tag named Sanctioned. The firewall and Panorama consider any application without this predefined tag as unsanctioned for use on the network.
- The first part of the report (10 pages) focuses on the SaaS applications used on your network during the reporting period. It presents a comparison of sanctioned versus unsanctioned SaaS applications by total number of applications used on your network, bandwidth consumed by these applications, the number of users using these applications, top user groups that use the largest number of SaaS applications, and the top user groups that transfer the largest volume of data through sanctioned and unsanctioned SaaS applications. This first part of the report also highlights the top SaaS application subcategories listed in order by maximum number of applications used, the number of users, and the amount of data (bytes) transferred in each application subcategory.
- The second part of the report focuses on the detailed browsing information for SaaS and non-SaaS applications for each application subcategory listed in the first-part of the report. For each application in a subcategory, it also includes information about the top users who transferred data, the top blocked or alerted file types, and the top threats for each application. In addition, this section of the report tallies samples for each application that the firewall submitted for WildFire analysis, and the number of samples determined to be benign and malicious.
Use the insights from this report to consolidate the list of business-critical and approved SaaS applications and to enforce policies for controlling unsanctioned applications that pose an unnecessary risk for malware propagation and data leaks.
The predefined SaaS application usage report introduced in PAN-OS 7.0 is still available as a daily report that lists the top 100 SaaS applications (with the SaaS application characteristic, SaaS=yes) running on your network on a given day.
- Tag applications that you approve for use on your
network as Sanctioned.For generating an accurate and informative report, you need to tag the sanctioned applications consistently across firewalls with multiple virtual systems, and across firewalls that belong to a device group on Panorama. If the same application is tagged as sanctioned in one virtual system and is not sanctioned in another or, on Panorama, if an application is unsanctioned in a parent device group but is tagged as sanctioned in a child device group (or vice versa), the SaaS Application Usage report will report the application as partially sanctioned and will have overlapping results.Example: If Box is sanctioned on vsys1 and Google Drive is sanctioned on vsys2, Google Drive users in vsys1 will be counted as users of an unsanctioned SaaS application and Box users in vsys2 will be counted as users of an unsanctioned SaaS application. The key finding in the report will highlight that a total of two unique SaaS applications are discovered on the network with two sanctioned applications and two unsanctioned applications.
- Select ObjectApplications.
- Click the application Name to edit an application and select Edit in the Tag section.
- Select Sanctioned from the Tags drop-down.You must use the predefined Sanctioned tag (with the green colored background). If you use any other tag to indicate that you sanctioned an application, the firewall will fail to recognize the tag and the report will be inaccurate.
- Click OK and Close to exit all open dialogs.
- Configure the SaaS Application Usage report.
- Select MonitorPDF ReportsSaaS Application Usage.
- Click Add, enter a Name,
and select a Time Period for the report (default
is Last 7 Days).By default, the report includes detailed information on the top SaaS and non-SaaS application subcategories, which can make the report large by page count and file size. Clear the Include detailed application category information in report check box if you want to reduce the file size and restrict the page count to 10 pages.
- Select whether you want the report to Include
- All User Groups and Zones—The report includes data on all security zones and user groups available in the logs.If you want to include specific user groups in the report, select Include user group information in the report and click the manage groups link to select the groups you want to include. You must add between one and up to a maximum of 25 user groups, so that the firewall or Panorama can filter the logs for the selected user groups. If you do select the groups to include, the report will aggregate all user groups in to one group called Others.
- Selected Zone—The report filters data for the specified security zone, and includes data on that zone only.If you want to include specific user groups in the report, select Include user group information in the report and click the manage groups for selected zone link to select the user groups within this zone that you want to include in the report. You must add between one and up to a maximum of 25 user groups, so that the firewall or Panorama can filter the logs for the selected user groups within the security zone. If you do select the groups to include, the report will aggregate all user groups in to one group called Others.
- Selected User Group—The report filters data for the specified user group only, and includes SaaS application usage information for the selected user group only.
- Select whether you want to include all the application subcategories in the report (the default) or Limit the max subcategories in the report to the top 10, 15, 20 or 25 categories (default is all subcategories).
- Click Run Now to generate the report on-demand for the last 7-day and the last 30-day time period. Make sure that the pop-up blocker is disabled on your browser because the report opens in a new tab.
- Click OK to save your changes.
- Schedule Reports for Email Delivery.The last 90-days report must be scheduled for email delivery.On the PA-200, PA-220, and PA-500 firewalls, the SaaS Application Usage report is not sent as a PDF attachment in the email. Instead, the email includes a link that you must click to open the report in a web browser.
Monitor > PDF Reports > SaaS Application Usage
Monitor > PDF Reports > SaaS Application Usage Use this page to create a report that summarizes the SaaS application activity on your network. This ...
SaaS Application Usage PDF Report
SaaS Application Usage PDF Report The SaaS Application Usage PDF report (introduced in PAN-OS 7.1) was enhanced in PAN-OS 8.0 to highlight application usage by ...
App-ID Features New App-ID Features Description SaaS Application Visibility for User Groups To help you monitor the assortment of SaaS applications that serve the productivity ...
SaaS Visibility Enhancements in the ACC
SaaS Visibility Enhancements in the ACC ACC Enhancements for SaaS Application Visibility —The ACC has a new global filter to assess application activity on your ...
Actions Supported on Applications
Actions Supported on Applications You can perform any of the following actions on this page: Actions Supported for Applications Description Filter by application To search ...
Saas Application Visibility for User Groups
SaaS Application Visibility for User Groups For better visibility in to SaaS activity on your network, PAN-OS 8.0 includes enhancements to the SaaS Application Usage ...
Objects > Tags
Objects > Tags Tags allow you to group objects using keywords or phrases. Tags can be applied to address objects, address groups (static and dynamic), ...
User-ID Overview User-ID™ enables you to identify all users on your network using a variety of techniques to ensure that you can identify users in ...