When you add a cloud app, SaaS Security API automatically
scans the app against the default data patterns and displays any
match occurrences. As a best practice, consider the business use
of your applications to determine if you need to Add a New Asset Rule to
look for incidents unique to Dropbox or Yammer.
) Configure or edit a data pattern.
You can Configure
Data Patterns to identify specific strings of text, characters,
words, or patterns to make it possible to find all instances of
text that match a data pattern you specify.
Start scanning Dropbox or Yammer for incidents.
Cloud Apps & Scan Settings
In the Cloud Apps row that corresponds to the new
app you just added, select
SaaS Security API scans assets in the associated app and
identifies possible incidents. Depending on the number of users
and assets, it may take some time to complete the process. However,
as soon as you begin to see this information populating the
As SaaS Security API scans files and matches them against
enabled policy rules, you can Monitor
Scan Results on the Dashboard to verify that your policy
rules are effective. Monitoring the progress of the scan during
the discovery phase allows you to Fine-Tune
Policy to modify the match criteria and ensure better results.