Suspicious SaaS Activities
Accessing Suspicious SaaS Activities
To access the Suspicious SaaS Activities page, go to the SaaS menu and select Suspicious SaaS Activities.
Suspicious SaaS Activities Tasks
The following links describe the Securing SaaS User Accounts tasks you can perform on this page:
• | Tracking Suspicious SaaS Activities |
• | Reclaiming SaaS Licenses |
Suspicious SaaS Activities UI Overview
The following tables describe the Suspicious SaaS Activities types, buttons, and table columns.
• | Suspicious Activity Types |
• | Suspicious Activity Buttons |
• | Suspicious Activities Table Columns |
The following table describes the two suspicious activity types and the option for SaaS Management Administrators to identify unrecognized suspicious activities as recognized.
Suspicious Activity Type |
Description |
|||||||||
Unauthorized |
A user is inactive in the HR Roster and is using an application. |
|||||||||
Unrecognized |
A user is not listed in the HR Roster and is using an application. |
|||||||||
Recognized |
This option is only used by a SaaS Management Administrator to identify unrecognized suspicious activities as recognized. Examples:
|
The following table describes the Suspicious Activity buttons.
Button |
Description |
Select |
Displays the suspicious activity types and filters the Activity Type column information based on the chosen activity type. |
Show Filters |
Reveals columns that have search or filters. |
Clear All |
Clears search terms in grid column searches. |
Export CSV |
Exports a listing of your Suspicious Activities based on your chosen column and filtering options. |
Suspicious Activities Table Columns
The following table explains the Suspicious Activities table columns.
Column |
Description |
||||||
User |
Either:
|
||||||
First Name |
Either:
|
||||||
Last Name |
Either:
|
||||||
App |
Links to the application’s Overview Tab . |
||||||
Activity Type |
Information is filtered based on the activity type chosen from the Select button. |