Fortinet Document Library

Version:

Version:


Table of Contents

New Features

Download PDF
Copy Link

Shadow IT Monitoring Service

The Shadow IT dashboard continuously monitors customer environments by correlating data from FortiOS and FortiCASB to discover and investigate the risk of shadow IT and remediate and control the security risks.

To use this feature, you must have a FortiCASB account subscribed for SaaS features, and a FortiCASB connector configured on FortiAnalyzer.

To view the Shadow IT dashboard:
  1. Go to FortiView > Monitors and select Shadow IT from the tree menu.
    The Shadow IT dashboard has the following widgets:
    1. Unsanctioned Cloud Service.
    2. Non-federated Users with File Access.
    3. File Exfiltration Detection.
    4. Non-federated Users with Cloud Access.
  2. In order for FortiAnalyzer to correlate data from FortiGate and FortiCASB to generate the log data used in the Shadow IT monitor, an administrator must configure the FortiCASB connector in FortiAnalyzer's Fabric View.
    When creating or editing a FortiCASB connector, enter the following information:
    • Name: Enter a name for the FortiCASB connector.
    • Description: (Optional) Enter a description of the connector.
    • IP/FQDN: Enter the FortiCASB FQDN for your chosen server location. The server location is selected when creating your FortiCASB account. Use forticasb.com for global servers or eu.forticasb.com for EU based servers.
    • Token: Enter the credentials token used for authentication. To create a FortiCASB credentials token, log in to FortiCASB with your account, go to Home > Manage Company > API Setting, and click Generate New. For more information, see FortiCASB on the Fortinet Docs Library.
    • Status: Set the status to ON.
  3. To retrieve cloud application, users, and sensitive file information from FortiCASB on demand, an administrator can configure a playbook on FortiAnalyzer in FortiSOC. The playbook must include a task configured with the FortiCASB connector and Get Cloud Data action.

Shadow IT Monitoring Service

The Shadow IT dashboard continuously monitors customer environments by correlating data from FortiOS and FortiCASB to discover and investigate the risk of shadow IT and remediate and control the security risks.

To use this feature, you must have a FortiCASB account subscribed for SaaS features, and a FortiCASB connector configured on FortiAnalyzer.

To view the Shadow IT dashboard:
  1. Go to FortiView > Monitors and select Shadow IT from the tree menu.
    The Shadow IT dashboard has the following widgets:
    1. Unsanctioned Cloud Service.
    2. Non-federated Users with File Access.
    3. File Exfiltration Detection.
    4. Non-federated Users with Cloud Access.
  2. In order for FortiAnalyzer to correlate data from FortiGate and FortiCASB to generate the log data used in the Shadow IT monitor, an administrator must configure the FortiCASB connector in FortiAnalyzer's Fabric View.
    When creating or editing a FortiCASB connector, enter the following information:
    • Name: Enter a name for the FortiCASB connector.
    • Description: (Optional) Enter a description of the connector.
    • IP/FQDN: Enter the FortiCASB FQDN for your chosen server location. The server location is selected when creating your FortiCASB account. Use forticasb.com for global servers or eu.forticasb.com for EU based servers.
    • Token: Enter the credentials token used for authentication. To create a FortiCASB credentials token, log in to FortiCASB with your account, go to Home > Manage Company > API Setting, and click Generate New. For more information, see FortiCASB on the Fortinet Docs Library.
    • Status: Set the status to ON.
  3. To retrieve cloud application, users, and sensitive file information from FortiCASB on demand, an administrator can configure a playbook on FortiAnalyzer in FortiSOC. The playbook must include a task configured with the FortiCASB connector and Get Cloud Data action.