ON THIS PAGE
CASB Application Visibility Overview
To access this page, click Monitor > Maps & Charts > CASB Applications.
Use the CASB Application Visibility page to view information related to CASB supported cloud applications and categories by its volume and session by risks associated with the applications.
There are two ways in which you can view your CASB application visibility data: Summary View or Grid View. By default, the data is displayed in Summary View.
Summary View
The data presented in the area graph is refreshed automatically based on the selected time range. You can use widgets to view critical information such as CASB supported cloud applications.
Table 1 provides guidelines on using the widgets on the Summary View page
|
Field |
Description |
|---|---|
|
Time span |
Select the required time range to view a user's data. Use the custom option to choose the time range if you want to view data for more than one day. |
|
Show by |
Select from the following options to view a user's data:
|
|
Select graph |
Select from the following graphical representations to view a cloud application's data:
By default, data is shown in the Bubble Graph format. |
|
View by |
Select from the following options to view the cloud application's data:
|
Grid View
Click the Grid View link to obtain comprehensive details about cloud applications. You can view top applications by volume, top category by volume, and sessions by risk. You can also view the data in a tabular format that includes sortable columns. You can sort the data in ascending or descending order based on the applications name, risk level, and so on.
Table 2 provides guidelines on using the fields on the Grid View of the CASB Application Visibility page. Use these widgets to get an overall, high-level view of your applications, users, and the content traversing your network.
|
Field |
Description |
|---|---|
|
Top Apps by Volume |
Top cloud applications using the network traffic, such as Dropbox, Salesforce, and so on, sorted by bandwidth consumption. |
|
Top Category by Volume |
The top category of the cloud application, such as Web, infrastructure, and so on; sorted by bandwidth consumption. |
|
Sessions by Risk |
Number of events or sessions received; grouped by risk. |
Table 3 describes the fields in the table below the widgets.
|
Field |
Description |
|---|---|
|
Application Name |
Name of the application, such as Dropbox, Salesforce, and so on. |
|
Tag |
Displays if the application instance is tagged as untagged, sanctioned, or unsanctioned. |
|
Risk Level |
Risk associated with the application: critical, high, unsafe, moderate, low, and unknown. |
|
Users |
Total number of users accessing the cloud applications. |
|
Volume |
Bandwidth used by the cloud application. |
|
Total Sessions |
Total number of cloud application sessions. |
|
Category |
Category of the cloud application, such as Web, infrastructure, and so on. |
|
Sub Category |
Subcategory of cloud application. For example, file sharing, applications, and miscellaneous. |
|
Characteristics |
Characteristics of cloud application. For example, prone to misuse, bandwidth consumer, capable of tunneling. |