SaaS Security
Configure Settings on Data Security
Table of Contents
Expand All
|
Collapse All
SaaS Security Docs
-
-
- Begin Scanning an Amazon S3 App
- Begin Scanning a Bitbucket App
- Begin Scanning a Box App
- Begin Scanning ChatGPT Enterprise App
- Begin Scanning a Cisco Webex Teams App
- Begin Scanning a Confluence App
- Begin Scanning a Confluence Data Center App
- Begin Scanning a Dropbox App
- Begin Scanning a GitHub App
- Begin Scanning a Gmail App
- Begin Scanning a Google Cloud Storage App
- Begin Scanning a Google Drive App
- Begin Scanning a Jira App
- Begin Scanning a Jira Data Center App
- Begin Scanning a Microsoft Azure Storage App
- Begin Scanning a Microsoft Exchange App
- Begin Scanning a Microsoft Teams App
- Begin Scanning Office 365 Apps
- Begin Scanning a Salesforce App
- Begin Scanning a ServiceNow App
- Begin Scanning a ShareFile App
- Begin Scanning a Slack Enterprise App
- Begin Scanning a Slack for Pro and Business App
- Begin Scanning a Workday App
- Begin Scanning a Zendesk App
- Begin Scanning a Zoom App
- Perform Actions on Sanctioned Apps
- API Throttling
- Configure Classification Labels
- Microsoft Labeling for Office 365
- Google Drive Labeling
- Configure Phishing Analysis
- Configure WildFire Analysis
- Fine-Tune Policy
-
- What is an Incident?
- Filter Incidents
- Configure Slack Notification Alerts on Data Security
- Security Controls Incident Details
- Track Down Threats with WildFire Report
- Customize the Incident Categories
- Close Incidents
- Download Assets for Incidents
- View Asset Snippets for Incidents
- Modify Incident Status
- Email Asset Owners
- Generate Reports on Data Security
- Integrate CIE with Data Security
- Search in Data Security
-
-
- View Usage Data for Unsanctioned SaaS Apps
- SaaS Visibility Application Attributes
- How SaaS Security Inline Determines an App's Risk Score
- Identify Risky Unsanctioned SaaS Apps and Users
- Generate the SaaS Security Report
- Filter Unsanctioned SaaS Apps
-
- SaaS Policy Rule Recommendations
- App-ID Cloud Engine
- Guidelines for SaaS Policy Rule Recommendations
- Apply Predefined SaaS Policy Rule Recommendations
- Create SaaS Policy Rule Recommendations
- Enable SaaS Policy Rule Recommendations
- Monitor SaaS Policy Rule Recommendations
- Delete SaaS Policy Rule Recommendations
- Modify Active SaaS Policy Rule Recommendations
- Manage Enforcement of Rule Recommendations on Strata Cloud Manager
- Manage Enforcement of Rule Recommendations on Panorama
- Tag Discovered SaaS Apps
- Apply Tag Recommendations to Sanctioned Apps
- Change Risk Score for Discovered SaaS Apps
- Troubleshoot Issues on SaaS Security Inline
-
-
- Onboarding Overview for Supported SaaS Apps
- Onboard an Aha.io App to SSPM
- Onboard an Alteryx Designer Cloud App to SSPM
- Onboard an Aptible App to SSPM
- Onboard an ArcGIS App to SSPM
- Onboard an Articulate Global App to SSPM
- Onboard an Atlassian App to SSPM
- Onboard a BambooHR App to SSPM
- Onboard a Basecamp App to SSPM
- Onboard a Bitbucket App to SSPM
- Onboard a Bito AI App to SSPM
- Onboard a BlueJeans App to SSPM
- Onboard a Box App to SSPM
- Onboard a Bright Security App to SSPM
- Onboard a Celonis App to SSPM
- Onboard a Cisco Meraki App to SSPM
- Onboard a Claude App to SSPM
- Onboard a ClickUp App to SSPM
- Onboard a Codeium App to SSPM
- Onboard a Cody App to SSPM
- Onboard a Confluence App to SSPM
- Onboard a Contentful App to SSPM
- Onboard a Convo App to SSPM
- Onboard a Couchbase App to SSPM
- Onboard a Coveo App to SSPM
- Onboard a Crowdin Enterprise App to SSPM
- Onboard a Customer.io App to SSPM
- Onboard a Databricks App to SSPM
- Onboard a Datadog App to SSPM
- Onboard a DocHub App to SSPM
- Onboard a DocuSign App to SSPM
- Onboard a Dropbox Business App to SSPM
- Onboard an Envoy App to SSPM
- Onboard an Expiration Reminder App to SSPM
- Onboard a Gainsight PX App to SSPM
- Onboard a GitHub Enterprise App to SSPM
- Onboard a GitLab App to SSPM
- Onboard a Google Analytics App to SSPM
- Onboard a Google Workspace App to SSPM
- Onboard a GoTo Meeting App to SSPM
- Onboard a Grammarly App to SSPM
- Onboard a Harness App to SSPM
- Onboard a Hellonext App to SSPM
- Onboard a Hugging Face App to SSPM
- Onboard an IDrive App to SSPM
- Onboard an Intercom App to SSPM
- Onboard a Jira App to SSPM
- Onboard a Kanbanize App to SSPM
- Onboard a Kanban Tool App to SSPM
- Onboard a Krisp App to SSPM
- Onboard a Kustomer App to SSPM
- Onboard a Lokalise App to SSPM
- Onboard a Microsoft 365 Copilot App to SSPM
- Onboard a Microsoft Azure AD App to SSPM
- Onboard a Microsoft Exchange App to SSPM
- Onboard a Microsoft OneDrive App to SSPM
- Onboard a Microsoft Outlook App to SSPM
- Onboard a Microsoft Power BI App to SSPM
- Onboard a Microsoft SharePoint App to SSPM
- Onboard a Microsoft Teams App to SSPM
- Onboard a Miro App to SSPM
- Onboard a monday.com App to SSPM
- Onboard a MongoDB Atlas App to SSPM
- Onboard a MuleSoft App to SSPM
- Onboard a Mural App to SSPM
- Onboard a Notta App to SSPM
- Onboard an Office 365 App to SSPM
- Onboard Office 365 Productivity Apps to SSPM
- Onboard an Okta App to SSPM
- Onboard an OpenAI App to SSPM
- Onboard a PagerDuty App to SSPM
- Onboard a Perplexity App to SSPM
- Onboard a Qodo App to SSPM
- Onboard a RingCentral App to SSPM
- Onboard a Salesforce App to SSPM
- Onboard an SAP Ariba App to SSPM
- Onboard a ServiceNow App to SSPM
- Onboard a Slack Enterprise App to SSPM
- Onboard a Snowflake App to SSPM
- Onboard a SparkPost App to SSPM
- Onboard a Tableau Cloud App to SSPM
- Onboard a Tabnine App to SSPM
- Onboard a Webex App to SSPM
- Onboard a Weights & Biases App to SSPM
- Onboard a Workday App to SSPM
- Onboard a Wrike App to SSPM
- Onboard a YouTrack App to SSPM
- Onboard a Zendesk App to SSPM
- Onboard a Zoom App to SSPM
- Onboarding an App Using Azure AD Credentials
- Onboarding an App Using Okta Credentials
- Register an Azure AD Client Application
- View the Health Status of Application Scans
- Delete SaaS Apps Managed by SSPM
-
-
-
- New Features Introduced in December 2024
- New Features Introduced in November 2024
- New Features Introduced in October 2024
- New Features Introduced in August 2024
- New Features Introduced in July 2024
- New Features Introduced in June 2024
- New Features Introduced in May 2024
- New Features Introduced in April 2024
- New Features Introduced in March 2024
- New Features Introduced in January 2024
-
- New Features Introduced in November 2023
- New Features Introduced in October 2023
- New Features Introduced in September 2023
- New Features Introduced in August 2023
- New Features Introduced in July 2023
- New Features Introduced in June 2023
- New Features Introduced in May 2023
- New Features Introduced in April 2023
- New Features Introduced in March 2023
- New Features Introduced in January 2023
-
- New Features Introduced in December 2021
- New Features Introduced in October 2021
- New Features Introduced in September 2021
- New Features Introduced in August 2021
- New Features Introduced in July 2021
- New Features Introduced in June 2021
- New Features Introduced in May 2021
- New Features Introduced in March 2021
- New Features Introduced in January 2021
Configure Settings on Data Security
Define internal domains, add trusted users and domains, configure acceptable levels
of asset exposure, and set the time zone and language for SaaS Security.
Where Can I Use This? | What Do I Need? |
---|---|
|
Or any of the following licenses that include the Data Security license:
|
Before you start scanning, define any collaborators and the asset exposure level to
trigger incident reports. Then, configure global settings for Data Security to
use when scanning your sanctioned SaaS applications.
- Define Your Internal Domains
- Collaborators
- Exposure Level
- Define Users and Domains
- Enable Data Masking
- Configure Email Alias and Logo
Define Your Internal Domains
Add internal domains to Data Security to determine
if an asset is being shared externally with an untrusted user.
One of the first things you need to do is
to define your internal domains. Data Security uses the list
of internal domains you define to determine if the Collaborators on
an asset are internal to your company, or if the asset shared with
external users. Data Security determines this by matching the
domain name in a collaborator’s email address against the list of
internal domains defined. Depending on your policy rules, Data Security identifies an asset as an incident if shared with external users.
A trusted collaborator overrides untrusted domains.
Similarly, an untrusted collaborator overrides a trusted domain. For example,
you might determine that there is no business reason to trust a file
modification from fax_service@mycompany.com.
Because
Data Security uses the internal domains list to determine the Exposure
Level of an asset during the scan process, you must define
your internal domains list before you begin scanning your
cloud apps. Additionally, you can build in flexibility when you
define your internal domains:
- Wildcard matching—Use of wildcard (*.<domain>) is supported.
- Subdomains—You don't need to explicitly list subdomains; instead, use a wildcard (*.<domain>).
When
you modify the internal domains list, consider that you might need
to update the exposure, depending on the discovery state for a given
asset:
Asset | Rescan required to update exposure? |
---|---|
Existing, discovered assets | Yes. Rescan to enable Data Security to recalculate exposure. |
Future, undiscovered assets | No. Data Security automatically recalculates
the exposure. |
The Internal Domains list applies to all
cloud apps on Data Security so you must be an administrator
with a Super User role or an Admin role with access to All Apps
to modify this setting.
- To add your internal domains, select SettingsManage DomainsInternal DomainsEdit.
- Enter a comma-separated list of your Internal Domains.The internal domain you add here is displayed in the All Domains section only where there is an asset associated with the domain.
- To define any of the domains listed under the All Domains section as Trusted or Not Trusted, use the Actions menu against that domain.
- Save your changes.
Collaborators
Specify internal and external collaborators, and trusted
and untrusted users to configure the incident settings on Data Security.
Although different SaaS applications have different terminology
for sharing and collaboration, within Data Security, a collaborator
is any person who can access, view, preview, download, comment,
or edit a managed asset. To provide granular control over what types
of sharing pose a risk within your organization, Data Security
classifies Collaborators differently:
Because Collaborators apply to all cloud apps on Data Security, you must be an administrator with a Super Admin role or an
Admin with access to all apps to modify this setting.
- Internal vs. External Users—Data Security uses the domain name in the email address associated with the user’s cloud app account to determine whether the user is internal to your organization or not. You must Define Your Internal Domains before you begin scanning your application data so Data Security can properly identify assets shared with users who are external to your organization.
- Trusted vs. Untrusted Users—Using Data Security, you can configure a policy rule to create an incident if an external user has access to an asset. In some cases, sharing with external users—even though they are not part of your organization—does not pose a threat. For example, they might be partners or other trusted third-parties who you can mark as Trusted. Or, if you have entire domains that belong to trusted partners or user groups, you can mark those domains as Trusted so those users with email addresses from that domain are trusted users.When you asses incidents, you can update the domain trust settings in SettingsManage External Collaborators and mark the domain as either trusted or untrusted.Alternatively, when you view asset details you can explicitly designate an external collaborator as Trusted to exclude from incident discovery or Untrusted to ensure both new and modified assets shared create incidents. Changing trust settings for a user or a domain changes the underlying global policy Data Security uses when scanning assets. Trust settings enable more granular policy control while still allowing you to distinguish between internal and external sharing.
Exposure Level
Data Security scans assets for exposure levels to
identify how and with whom the asset is shared.
Data Security uses an exposure level status to describe how your shared assets display in an
application and determines file exposure by analyzing all users who have access to the
file. Although every SaaS application has its own settings for controlling how and with
whom users may share assets, Data Security provides a mechanism for setting and
enforcing acceptable exposure levels consistently across all your managed apps.
On Data Security, each policy—both the default rules as well as any custom rules you
define—enable you to set a level of exposure identifying an asset as being at risk
(except for Sensitive Documents rules, which match documents with predefined
characteristics).
The exposure level is just one match criteria available in a policy and, therefore, determining
the minimum level of exposure posing a threat depends on the other match criteria, and
what threat the policy protects against.
For example, the WildFire policy scans all your assets for files containing malware. In this
case, a file containing malware poses a threat no matter the exposure level. However, if
you add a Sensitive Credential policy rule to protect an engineering GitHub repository
used for sharing code throughout the company, any external sharing poses a risk, so you
should configure the rule to match on Public and External exposures.
Data Security scans assets for the following exposure levels:
Unknown exposure level is used exclusively to search for assets, not policies, and only applies
to AWS S3 buckets.

Exposure Level | Description |
---|---|
Public | An asset is Public if it contains either
of the following:
|
External | The owner invited one or more users outside
of your organization to collaborate on the asset. |
Company | The owner created a company-wide URL giving anyone
in the company direct access to the asset. |
Internal | Includes assets the owner has not shared.
Also includes assets the owner has shared, but only with users within
the company. These users have an email address in the enterprise
domain name. |
Shared via Custom URL | The owner created a custom link, vanity
URL, or password-protected link for direct access to the asset and then
shared this asset (directly or indirectly) using the link. This option is for Box assets only and hidden if you're not using Data Security to secure Box
applications. |
Define Trusted and Untrusted Users and Domains
Define users and domains as trusted or untrusted on Data Security to provide more granular control and monitoring of
who accesses assets.
One of the first things you did when setting
up Data Security was Define
Your Internal Domains to determine if the user is internal
to your organization. If an external user has an email address that
does not belong to an internal domain, you can use Data Security to define users and domains as trusted or untrusted to protect
your assets and have better granular control over who has access.
After you define external users and domains, Data Security reports
any assets shared inadvertently or maliciously.
Because the Trusted and Untrusted Users and Domains list applies to all cloud apps on Data Security, you must be an administrator with a Super Admin role or Admin with
access to all apps to modify this setting.
- Select SettingsManage External Collaborators. Define your users and domains as per your need.
- Save your setting.
Enable Data Masking
Configure data masking on Data Security to control
the exposure of data displayed in an incident snippet.
Data Security uses data masking to mask the data in the snippets. Data masking
enables you to control how Data Security stores and displays sensitive data,
such as credit card numbers or Social Security numbers, to the administrator and
other nonprivileged users who can view the snippet of content matched as an
incident.
By default, Data Security displays the last four digits of the value in cleartext
(partial masking). For example, Data Security displays a
snippet of credit card number as XXXX-XXXX-XXXX-1234.
You can specify that Data Security display values in cleartext (no masking) or
fully mask the data to hide all the values.
Because
the Data Masking setting applies to all cloud apps on Data Security, you must be an administrator with a Super Admin role or Admin
role with access to all apps to modify this setting.
- To specify the storage and reporting of sensitive data by Data Security, select Settings Scan SettingsSensitive Fields in SnippetsEdit.For financial and PII policy rules, Data Security displays a snippet of 100 bytes of content before and after the violation.
- Do not mask—Displays all the values in cleartext.
- Partial Mask —Displays only the last four digits in cleartext.
- Full mask—Does not display any values.
- Save the changes.Save your changes.
Configure the Email Alias and Logo for Sending Notifications
Customize the email alias and logo on Data Security
for policy violation notifications.
Data Security is configured with an SMTP service enabling you to send email
notifications when a policy violation occurs. When you email a user, the default
display name is Data Security and the sender email address is
no_reply@paloaltonetworks.com. Although asset owners can
reply to this default sender email address, no_reply
discourages them. Best practice is to change this default and others to personalize
your communications. Use the logo feature to legitimize the email sender so asset
owners don't mistake your email as spam.
Because
General Settings applies to all the cloud apps on Data Security, you must be an administrator with a Super Admin role or an
Admin role with access to all apps to modify this setting.
- To configure email alias, select SettingsWorkflow SettingsEmail Configuration/Email Logo.
- Sender Name—Name of the sender of the email message. Best practice is to use a name with imperative, such as Security Administrator or Compliance Auditor.
- Reply-to-Email—Address to use for communications. Best practice is to use a distribution list or an alias with a group of administrators or compliance auditors. Optionally, you can choose an alias that automatically triggers a helpdesk ticket upon reply.
- Upload an Email Logo: SettingsWorkflow SettingsEmail Configuration. Browse to select the image, then Save.