Access Analyzer provides visibility into the security policy and its attributes that
contributed to blocking the user access to an application.
Access Analyzer provides a comprehensive
view of policy enforcement that enables faster troubleshooting and resolution of
user access issues. Without clear visibility into which attributes triggered the
block for the user to access an application, it can be challenging to determine if
the block was appropriate or the result of an unintended security policy
configuration. Access Analyzer addresses this issue by allowing you to gain insights
into security policy attributes within a few seconds.
When you submit a user access issue query in Access Analyzer, you can view
the exact user attributes that contributed to the policy enforcement, including
specific user groups that triggered the policy rule match, the Host Information
Profile (HIP) applied at the time, URL categories, and devices that were evaluated
at the time of the block. You can also view a time line of events in traffic logs,
that shows when a security policy rule matched and any policy rule changes that
contributed to its enforcement.
The feature is valuable in common scenarios such as when a user is added to
a dynamic user group that restricts access to corporate resources, when a device's
posture changes due to security software being uninstalled, or when application
identification issues occur. This visibility enables you to perform remediation
steps effectively when blocks are legitimate, or to quickly correct policy
configurations when blocks occur in error.