: Monitor Scan Results on the Dashboard
Focus
Focus

Monitor Scan Results on the Dashboard

Table of Contents

Monitor Scan Results on the Dashboard

Review the scan results reported by
Data Security
on a single dashboard.
Review the scan results reported by
Data Security
on a single dashboard.

Monitor Scan Results

As
Data Security
starts scanning the sanctioned SaaS applications, the
Dashboard
presents a summary of the scan in
eight
panes. Each of these panes displays a summary of information discovered during application scanning. Widgets are interactive, so you can click screen objects within a widget to drill down into more detailed information.
  1. Data Assets
    This widget displays summary information about assets discovered during scanning.
    By Exposure
    : Hover your mouse over the pie chart or click the
    Public, Company, External, or Internal
    links to view all data assets under their respective exposure category.
    By Data Types
    : Hover your mouse over the pie chart or click the
    txt, docx, csv
    or other data types to view the data assets under their respective data type category.
    Click
    View All Data Assets
    to open the
    Data Assets
    page to display all assets (without any filters).
  2. Top Data Profiles
    This widget displays the data profiles and the categories under which they are exposed. In the example given below, hover your mouse over the
    Sensitive Content
    bar to view the numbers for Public, Company, Internal, and External exposure types.
    Choose
    By Most Assets
    to view the data profiles with most assets (from top to bottom). Choose
    By Most Exposed Assets
    to view the data profiles with the highest number of exposed assets (from top to bottom). Click on a data profile to view all assets in that specific category in the
    Data Assets
    page.
  3. Top Users
    This widget displays the top data asset owners. Use the following filters to get a more granular data.
    • By Most Assets
    • By Most Public Assets
    • By Most Incidents
  4. Open Incidents by Severity
    This widget displays the open incidents categorized according to their severity. Use the following filters to get a more granular data.
    • Critical
    • High
    • Medium
    • Low
  5. User Activity Policy Violations
    This widget displays the policy violations for
    User Activity
    and
    Security Controls
    policies.
  6. Incidents by Status
    This widget displays the status of incidents. The two states are
    Open
    and
    Closed
    .
  7. Top Policies
    The
    Top Policies
    widget summarizes the number of open incidents detected against each policy. When
    Data Security
    starts scanning files and matching them against enabled policy rules, the default action is to generate a log entry when a policy violation occurs. If you enable email alerts for high-risk issues such as malware or PII compliance violations, you would also receive an automatic email notification in addition to incident logging.
    The incidents widget displays a summary of policies with the number of open violations, any new incidents discovered in the last seven days, and the number of resolved incidents. The
    Data Security
    service sorts the violations in the incidents widget from the highest severity level to the lowest severity level so that you can assess policies with the highest severity level first.
    The verticals bars next to the policy names displays the severity level for each policy. Click on the policy name to get more details associated with the policy.
  8. Top Domains
    The
    Top Domains
    widget lists the top 10 domains with the most assets shared with external collaborators by your internal users. Click on either
    Domain
    or
    Users
    to view more details associated with the domain.
    If an external user has an email address that does not belong to an internal domain, you can use
    Data Security
    to define users and domains as trusted or untrusted. Defining a domain as trusted or not trusted enables you to protect your assets and have better granular control over who has access to your assets.

Recommended For You