Skip to main content

This dashboard aims to surface the application risk in your environment. Use the dashboard to better understand:

  • What applications are being used in your environment
  • Are any of them unmanaged, untagged, or risky
  • Is there any sensitive or risky data movement through these applications

Let’s take a look in our demo environment. 

The dashboard starts with a summary of applications being used. Here we can see 295 applications are detected, and 275 of them are unmanaged. Out of these applications, we can get visibility into how many of them are rated as “excellent,” “high,” “medium,” “low,” and “poor” in terms of risk (Cloud Confidence Level). This will help us decide how many “risky” and “less risky” applications are being used in our environment. In the meantime, we can also see how much data is moving to these “risky” and “less risky” applications. 

T37G-rTPIALTRrfDwF8lszh6d7vibn9N1MntYNvBmSjrUL-KoplehwGn_Cg7-KL8R5dqQN-4JnBW4tLeR817hSShOGETSZMfWEpJGhgycJ7NcAiWcCxtPMB7tWPxcge0wEcR9hk2qpWiNcflawXwzYs

The dashboard then provides detailed information about risky applications and traffic detected, which allows us to perform deep investigations on risky application usage and sensitive data movement. 

ND0hbKMoKnvctyobf4jGvXLo_J3hgcNuVyij4HLOBF7VQ1txpT6JZ0S2ClOfNhs4uN7vbcEJA-LeWS0gbPOKQojUAsYM8TOxOtD7E5EfrJSXZUT63I1arqpa9Z2YPev8wP4e8mQJQXY_e-s2Hy7vXw8

Organizations usually accept the risk of managed applications, even if they are not well-rated in Cloud Confidence Level. So, the dashboard highlights the volume of allowed data movement to risky unmanaged applications, and the top risky unmanaged applications with allowed data movement. 

i7D7tIDn6p_EpxH8dXnQ5_v3ouu8WSAGZYKe4bL3ssajUKRpsI1W3BJ0CikogWPD9UwQf6hzqdY8nL7RBklIvYvN7yYakTxzFhC6IGR-QDAC1vn3EF3SLrUVd1q8o48PZ1rSFUe6I3dt58TaP1hMH9I

Here, the dashboard also highlights sensitive data moving to risky applications with no restrictions, which represents the opportunity to add controls or tune policies. You may want to consider coaching or blocking sensitive data movement to unmanaged and risky applications.

o3PrgJVa8ZIATzDm3zP1nvtqZ1cgPXmEvE2WLpwtipHY7-pGIBDdcWXFKtK3jvFi4Y_PW85XOBsyxXgC31BE_NcrBOK_LLZK6R0HA6L0_duz118mC2JwltMehj6eWIPfTOO-oxLNK8X22P-5ed3PbO0

Keep scrolling down. We will get visibility into application instance awareness. This part helps us better understand instance usage in our environment. Here we can see how many of our applications are “sanctioned,” “unsanctioned,” or even “untagged.” Use the Sankey chart to identify data movement to non-corporate instances. If you see corporate instances listed, please tag them as “sanctioned” in the Netskope UI.

ewC69_eY-zYyH-J-NtGSEkscViE6b4ImSQa1EsYrMYUQJMcQVas8eBP9_VJnFd7eItCeRpM3uJIpvmC-WP7hpZLI1ZtrAQp67lVHHBfaG3g0IoGiL3VuoOMVMaX1s46ajk-pXGLn7f9oIIEoiM0lO4c

The last section of this dashboard provides visibility into risky applications identified with Cloud Confidence Index data. Use this section to identify and manage intense usage of CCI risky applications. 

7-zbwERvOrzXBfBEHHMy4GXDU4JV-hPZusTtK8ILRlbzXrklCY3uIvlHYNtrz44NCAs7d4JMJj8ZwAc3-bYq-Jq0d8ODGD6TYbsVa6Uf-zx0imiE_UzWK2wIH-hI2Rj6ZU61fuhMgo8sh0WPCGgRzWc

The dashboard is attached below. Feel free to import and view it in your own environment. Let us know if you have any questions or feedback!

 

Be the first to reply!

Reply