Fortinet white logo
Fortinet white logo

New Features

Shadow IT monitoring for cloud application and users 7.0.1

Shadow IT monitoring for cloud application and users 7.0.1

The Shadow IT menu is now available under FortiView with enhanced dashboards for Top Cloud Applications and Top Cloud Users. IT administrators can interact with the dashboards, and drilldown on each application for more details such as the application risk score, files uploaded/downloaded to/from cloud, and application users.

To view Shadow IT FortiView enhancements:
  1. Go to FortiView.
    The new Shadow IT menu option has been added, which includes the Top Cloud Applications and Top Cloud Users dashboards. These dashboards were previously located in the Applications & Websites menu.
  2. In the Top Cloud Applications dashboard, the Login IDs column has been renamed to Unique Sources, and the risk value is changed from Critical, High, Medium, Elevated, and Low to a numerical value.

    After drilling down from an entry, Unique Sources displays the number of sources based on the source IP or email address.

  3. In the Top Cloud Users dashboard, the number of applications is displayed in the Applications column instead of the application's name.

    After drilling down from an entry, the entry for each application is displayed.
  4. For application information, FortiAnalyzer will first check the Shadow IT database. If no results are found, FortiAnalyzer will use the metadata. In the following application information example, the first is from the Shadow IT database, and the second is from the metadata.
    • Shadow IT Database
    • Metadata

Shadow IT monitoring for cloud application and users 7.0.1

Shadow IT monitoring for cloud application and users 7.0.1

The Shadow IT menu is now available under FortiView with enhanced dashboards for Top Cloud Applications and Top Cloud Users. IT administrators can interact with the dashboards, and drilldown on each application for more details such as the application risk score, files uploaded/downloaded to/from cloud, and application users.

To view Shadow IT FortiView enhancements:
  1. Go to FortiView.
    The new Shadow IT menu option has been added, which includes the Top Cloud Applications and Top Cloud Users dashboards. These dashboards were previously located in the Applications & Websites menu.
  2. In the Top Cloud Applications dashboard, the Login IDs column has been renamed to Unique Sources, and the risk value is changed from Critical, High, Medium, Elevated, and Low to a numerical value.

    After drilling down from an entry, Unique Sources displays the number of sources based on the source IP or email address.

  3. In the Top Cloud Users dashboard, the number of applications is displayed in the Applications column instead of the application's name.

    After drilling down from an entry, the entry for each application is displayed.
  4. For application information, FortiAnalyzer will first check the Shadow IT database. If no results are found, FortiAnalyzer will use the metadata. In the following application information example, the first is from the Shadow IT database, and the second is from the metadata.
    • Shadow IT Database
    • Metadata