Skip to main content
Cloud Apps
Updated over 10 months ago

What Cloud Apps Protection is about?

Businesses are using various cloud platforms, from products like Google Workspaces and Microsoft 365 to custom cloud-native applications.

As a result, the data and users face threats that didn’t exist before. Organizations must be able to ensure the data is protected while also facilitating productivity. Moreover, system admins need tools to highlight security gaps in user management and potential exposures of sensitive data.

When it comes to Cloud Apps protection, we divide it into two dimensions:

  1. Cloud Data Protection

  2. User & Security Posture


Cloud Data Protection

Guardz manages access to files and folders using best security practices. If confidential data is shared or made public, an alert is sent to the IT admin.

In the Control Center > Cloud Data Protection, you can view the different connected applications & the last sync of each app, connect new applications and view the Assets Allow List.

To remediate data protection issues, you have 4 options:

  1. Add the asset to the Assets Allow list

  2. Notify the user

  3. Manually modify the asset's sharing permissions

  4. Remove the public link (available for Google and Microsoft assets only)


"Remove Public Link" is an automated remediation tool that allows you to remove the permission shares and public links of an asset with a click of a button. For Google, please note, it’s possible that admins will need to grant additional permissions if the latest app isn’t already installed. In this case, you will receive a notification with a link to grant permissions.


Supported Apps: Cloud Data Protection

Cloud Data Protection

Cloud App

Detection

Google Drive

Exposed data

Microsoft OneDrive

Exposed data

SharePoint

Exposed data

monday.com

Exposed data

Assets Allow List

The Assets Allow list is located at the bottom of the Cloud App module, where you can view all the assets (files/folders, etc.) that have been allowed by you to have a public URL or guest users.

Any asset on the Assets Allow list will not trigger an issue in the future.

You can take action from this table and remove an asset from the allowed list. Once removed, in the following scan, new issues related to the asset should be flagged.


User & Security Posture:

Guardz generates alerts in the platform after scanning individual user configurations and activity.

In the Control Center > User & Security Posture, you can view the number of protected users (Active users) and make changes in the license allocation if needed.

Supported Apps:

Cloud App

Detection

Google Workspace

Suspicious activity detection and Security policies verification

Microsoft 365

Suspicious activity detection and Security policies verification

monday.com

Suspicious activity detection and Security policies verification

Dropbox

Suspicious activity detection and Security policies verification

Did this answer your question?