Fortinet black logo

online help

Discovery

Discovery

FortiCASB classifies data as either data at rest or traffic data. Data at rest is data uploaded onto the cloud application before it has been linked with FortiCASB, while traffic data is any data uploaded after FortiCASB has started monitoring the cloud application.

You can run scans on the data in your cloud platforms to determine their contents. Depending on the policies you set, FortiCASB will classify this data as either sensitive data or non-sensitive data. This can be seen in the Discovery page for each cloud application.

The Discovery page shows basic information about the data in your cloud application, as well as information about the users with access to your data.

If you don't run a manual scan, FortiCASB will scan files on an individual basis whenever a user accesses the file.

If you would like to sync data, you can run Sync from the User and Document page.

Panel descriptions

User Entitlements—shows all users with access to your cloud application.

Privileged User Any user with specific administrative privileges. For a list of these specific privileges, see Discovery
Dormant User Any user that has not accessed the cloud application for at least 30 days.
External User Any user from an external company with access to your cloud application.

If the User Entitlements panel can't get privileged roles for your Office 365 platform, make sure you have global administrator privileges and have Azure Active Directory Premium P2.

Sensitive Data Discovery—gives an overview of sensitive data on your cloud application.

Sensitive Files Shows the number of files on your cloud application with sensitive information, out of the total number of files.
High Risk File Owners Shows how many users own files with sensitive information.
Shared Files Shows the number of shared files
Malware Files Shows the number of files with malware scan results

Click the number under Policy Violation to show the specific policies triggered.

Use Filter to filter or search through the list.

File Exposure—gives an overview of shared files on your cloud application.

Exposure Summary Gives a summary of the file exposure. Click to filter the list.
Top File-Sharing Owners Shows the owners sharing the most files.
Top Users/Groups with access to Shared Files Shows the users or groups with access to the most files.

External Collaboration—highlights the file shared to the external user/group

External Summary Gives a summary of the external files.
Top External Domains Shows external domains which are shared the most files.
Top External Users Shows external users which are shared the most files.

Click on [...] under Share or Link for more details.

Use Filter to filter or search through the list.

Discovery

FortiCASB classifies data as either data at rest or traffic data. Data at rest is data uploaded onto the cloud application before it has been linked with FortiCASB, while traffic data is any data uploaded after FortiCASB has started monitoring the cloud application.

You can run scans on the data in your cloud platforms to determine their contents. Depending on the policies you set, FortiCASB will classify this data as either sensitive data or non-sensitive data. This can be seen in the Discovery page for each cloud application.

The Discovery page shows basic information about the data in your cloud application, as well as information about the users with access to your data.

If you don't run a manual scan, FortiCASB will scan files on an individual basis whenever a user accesses the file.

If you would like to sync data, you can run Sync from the User and Document page.

Panel descriptions

User Entitlements—shows all users with access to your cloud application.

Privileged User Any user with specific administrative privileges. For a list of these specific privileges, see Discovery
Dormant User Any user that has not accessed the cloud application for at least 30 days.
External User Any user from an external company with access to your cloud application.

If the User Entitlements panel can't get privileged roles for your Office 365 platform, make sure you have global administrator privileges and have Azure Active Directory Premium P2.

Sensitive Data Discovery—gives an overview of sensitive data on your cloud application.

Sensitive Files Shows the number of files on your cloud application with sensitive information, out of the total number of files.
High Risk File Owners Shows how many users own files with sensitive information.
Shared Files Shows the number of shared files
Malware Files Shows the number of files with malware scan results

Click the number under Policy Violation to show the specific policies triggered.

Use Filter to filter or search through the list.

File Exposure—gives an overview of shared files on your cloud application.

Exposure Summary Gives a summary of the file exposure. Click to filter the list.
Top File-Sharing Owners Shows the owners sharing the most files.
Top Users/Groups with access to Shared Files Shows the users or groups with access to the most files.

External Collaboration—highlights the file shared to the external user/group

External Summary Gives a summary of the external files.
Top External Domains Shows external domains which are shared the most files.
Top External Users Shows external users which are shared the most files.

Click on [...] under Share or Link for more details.

Use Filter to filter or search through the list.