View the App Discovery Report

Monitor the cloud apps in use by your organization with the App Discovery report. To effectively reduce the risk introduced by apps, monitor app use and look for a reduction over time in the number of DNS requests made by apps with high and very high-risk assessments.

Prerequisites

  • A minimum user role of Read-only. For more information, see Manage Accounts.

View the App Discovery Report

  1. Navigate to Monitor > Reports > App Discovery.
  1. View the discovered apps in your environment.
    • Unreviewed—The app has not yet been assigned any label.
    • Under Audit—The app is currently being reviewed.
    • Not Approved—The app should not be approved for use in your environment.
    • Approved—The app may be used in your environment.
2688

Note: Once an app has been given a label, it cannot be set back to Unreviewed. You can use the Under Audit label for apps that still need review. When you set an app to Not Approved, it is not automatically blocked from use. Labels within the App Discovery report are used to help review apps in your environment. You must configure application settings within a policy to block apps. For more information, see Control Apps.

  1. View the flagged categories.
    Cisco's Cloud Security researchers categorize apps according to function, source, and other factors. The categories of most interest (and most risk) are:
    • Anonymizers—Services that provide an anonymous proxy tool that attempts to make activity on the Internet untraceable. Apps in this category can introduce data exfiltration risks.
    • Cloud Storage—Applications that offer massively scalable storage capacity that can be used for applications and file storage. Apps in this category can also be used for data exfiltration.
    • Collaboration—Apps that may store sensitive data in unreliable services or unsecured environments.
    • Games—Online and mobile games. While games are not notable for data exfiltration risks, some can be used as attractive ways to introduce malware.
    • Media—Apps that can contribute to productivity loss and are frequently managed as unwanted bandwidth consumers.
    • P2P—Peer to Peer torrents like apps and protocols. These apps can be used for data exfiltration.
    • Social Networking—Can be used to transmit sensitive data as well as contribute to productivity loss.
2796

For a complete list of application categories, see Application Categories.

  1. View the flagged application protocols.
    These protocols are flagged based on the protocol used by the application.
    Note: Dismissing a flagged app card hides it from the overview. It does not label or block the app.
2780
  1. View DNS requests and traffic by App Risk.
    The graph shows the total number of DNS requests for apps discovered in the past 30 days. Secure Access assigns a risk score to apps based on several factors. The DNS requests made by a high-risk app can be considered more problematic than the same number of requests made by an app with a lower risk score.
1248

a. Filter the graph by label and risk.

1248

b. Select Web and review Traffic (bytes in and out) by App Risk for the last 30 days.

158

c. View All Traffic, Outbound Traffic or Inbound Traffic.

1258
  1. View apps by category and risk.
    Click a bar on the chart to view apps in that category in the App Grid.
1223

a. Filter by label and risk.

1537

App Discovery Report < View the App Discovery Report > View the Highest Risk Report