Hi Fortinet,
I am trying to understand how best to report on use of cloud services/adoption both for good and potential for harm, i.e. file exfiltration/backup of devices/shadow it, whilst also having a fairly open policy, reporting on sites and then also the activity undertaken within them.
I understand there are now Cloud logging/firewall tools for querying of cloud environments under the organisation's control, but what about users logging into the personal version of the same services, both from this ip range and via a wifi access point/mobile hotspot?
What would be the best way to report on such things as content uploads, whilst not getting masked in social media traffic uploads etc?
things of obvious interest (high) would be:
cloud services
azure
office 365 personal accounts
amazon storage
"web pc" services
uploads from a "vm" on a byod potentially
google cloud upload of devices normal login/ enterprise related storage vs personal
whatsapp files out
messenger files out
uploads:
box
dropbox
personal web email upload to attach files
backups:
i-cloud backup on some devices / byod device highlighted as lower risk?
acronis / other backup to cloud clients
Thanks
Stuart
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1731 | |
1099 | |
752 | |
447 | |
240 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.