View Asset Details
Learn about how Prisma SaaS displays detailed information about an asset violating a policy rule.
As Prisma SaaS scans your managed cloud apps and discovers content, you can view the details on
. This page provides context into the findings so you can Assess Incidents across these applications. The details for each incident vary depending on the associated cloud app, whether the asset is a file or a container (for example, a folder or a repository), the policy rule violated, and how the asset is shared.
Asset Detail Description
Summarizes asset file name, file type, exposure on cloud app, owner, and last updated timestamp.
Displays metadata about the asset including cloud app, data attachment, exposure, owner, creation date, file type, and size.
Displays which policy rule or rules that an asset violates, the date Prisma SaaS identified the incident, the status of the incident, and whether there have been previous incidents associated with the asset.
Matching Data Patterns
Displays the data pattern that the asset matched, number of occurrences, and date found. Admins with a Super Admin or Admin role may
Request Snippetsto view any available details about the asset matching the data pattern.
For assets that match the WildFire Analysis rule, you can Use the WildFire Report to Track Down Threats.
How is this File exposed?
Details how the asset is exposed (Published to the web, accessible by a public URL, if sign-in is required, or the asset is exposed by a parent folder). You can
View Detailsto access the asset URL, if available.
Who is accessing this File?
Lists the timestamp, type of access (for example, whether the user downloaded the file), user name, IP address, and location of the user. You can
View the eventdetails to investigate whether there is malicious or inappropriate access to the file.
Externalcollaborators for the asset. This section appears only if the asset has an
Externalexposure level. Additionally, if the collaboration settings are defined at the asset level, you can change the trust settings and remove collaborators. If the asset inherits a collaborator from a parent folder, you must change these settings from the parent folder.
Displays the asset in context of the hierarchy (one level above and one level below) to help you investigate the scope and source of the risky behavior and identify indirect or inherited exposures.
In this view, a red exclamation point denotes any asset with associated risks. Select an object in the hierarchy (either a folder, repository, or individual file) to display information about that object, including the creation date, file type, exposure, owner, and policy violation (if applicable).
Displays the exposure level of the asset (Internal, External, Company, or Public).
Use Faceted Search to Filter Assets
Learn how to use faceted search on Prisma SaaS to investigate and view details about incidents discovered when scanning your SaaS applications. ...
Change Sharing SaaS applications make it easy for users to collaborate and share information in the cloud. However, tracking and controlling the different types of ...
Learn how Prisma SaaS quarantines an asset discovered when scanning your sanctioned SaaS applications. ...
Monitor Scan Results on the Dashboard
Review the scan results reported by Prisma SaaS on a single dashboard. ...
Assess New Incidents
Prisma SaaS compiles a summary of incidents for you to view, assess and address by further investigation or closure. ...
Configure Prisma SaaS Global Scan Settings
Define internal domains, add trusted users and domains, configure acceptable levels of asset exposure, and set the time zone and language for Prisma SaaS. ...
Security Controls Incident Details
Use Security Controls incident details to investigate why Prisma SaaS created an incident for a security control policy violation. ...
Modify Incident Status
Use Prisma SaaS to modify and record the investigation status of an incident discovered when scanning your SaaS applications. ...
Secure Cloud Apps
Use Prisma SaaS to have visibility into and control over how your users are accessing and sharing data across SaaS applications. ...