Begin Scanning a Cisco Webex Teams App
Use these steps to connect your Cisco Webex Teams application to SaaS Security API.
SaaS Security API scans messages and files shared on spaces within the Cisco Webex Teams application. To begin scanning a Cisco Webex Teams application:
- Ensure that the Webex Teams account you plan to use with SaaS Security API has sufficient privileges.To connect a Webex Teams instance to SaaS Security API, you must use a Webex Teams account with Administrator privileges. Make sure the following settings are enabled:
- Log in to https://admin.webex.com, select.Usersadmin_account_usernameRoles and Security
- EnableFull administratorandCompliance Officerprivileges.Make sure to request another administrator to assign the Compliance Officer role to you, so your account has the correct privileges required to search for sensitive information in the Cisco Webex Teams app.The Webex Teams standard service plan supports data generated during the last 90 days. To enable longer-term visibility, consider upgrading to Cisco Webex Teams Pro Pack service plan before connecting to SaaS Security API.
- Add the Webex Teams app.
- From theDashboard, selectAdd a Cloud App.
- Select theCisco Webex Teamsapp.
- Connect to Webex Teams Account.
- SaaS Security API redirects you to Cisco identity broker to authorize access so that you can enter the email address and password for the Administrator account you want to use when connecting to the Webex Teams application.
- Review andAcceptthe permissions to onboard the account to SaaS Security API.If you want to give a descriptive name for the instance, select the link on, and enter a new name.SettingsCloud Apps & Scan Settings
- Configure a bot.A bot is a machine account that automates the process of sending messages to users on your behalf. To use a bot, you must create an access token to enable the bot to send these messages. When you Add a New Asset Rule, select theNotify via botauto-remediation action, and SaaS Security API will send a direct message on Webex Teams to the user whose messages or files triggered the incident. If you do not create a bot, SaaS Security API sends a message using the administrator’s name to the space where the user originally shared the file or message.
- Create a bot on the Webex developer portal using your administrator credentials, and copy the access token.
- SelectonActionsConfigure BotSettingsCloud Apps & Scan Settings
- Paste the access token on the app, and save your changes.
- Define global scan settings.
- Define Your Internal DomainsWhen you add the Webex bot, SaaS Security API automatically addswebex.botto the list of internal domains to ensure that the bot activity is restricted to the internal domain. Do not delete this entry from the list.
- Add policy rules or edit existing policy rules.When you add a new cloud application, SaaS Security API automatically scans assets against the default data patterns and displays the match occurrences. If you want to generate incidents and identify potential issues that are unique to the new instance, as a best practice consider the business use of your app to determine whether you want to Add a New Asset Rule.
- (Optional) Configure or edit a data pattern.If you find the existing data patterns do not identify the incidents you want to prevent from occurring, you can Data Patterns to identify specific strings of text, characters, words, or patterns to make it possible to find all instances of text that match a data pattern you specify.
- Start scanning the Cisco Webex Teams instance for issues.
- Select.SettingsCloud Apps & Scan Settings
- In the Cloud Apps row that corresponds to the new Webex Teams instance, select.ActionsStart ScanningSaaS Security API starts scanning all assets—files, messages—and spaces in the associated Webex Teams application and identifies incidents. Depending on the number of Webex Teams users and assets, it may take some time for the service to complete the process. However, as soon as you begin to see this information populating on theDashboard, you can begin to Assess Incidents on SaaS Security API.On a Webex Teams account, SaaS Security API monitors the following activities. However, activities that occurredbeforeyou added the Cisco Webex Teams application to SaaS Security API are not displayed on.ExploreActivities
- Adding or removing a user from a space.
- Adding a moderator to a space.
- Deleting a message — the deletion of a message is logged if the message had a file attached to it, or if the message had a policy violation and created an incident.
- Monitor the results of the scan.As SaaS Security API scans files and matches them against enabled policy rules, you can Monitor Scan Results on the Dashboard to verify that your policy rules are effective. Monitoring the progress of the scan during the discovery phase allows you to Fine-Tune Policy to modify the match criteria and ensure better results.
Recommended For You
Recommended videos not found.