Skip to main content

Check out Interactive Visual Stories to gain hands-on experience with the SSE product features. Click here.

Skyhigh Security

Policy Incidents for CSPM

The Incidents > Policy Incidents page is a central repository of all incidents that have violated Policies. All Services are consolidated on this page, or you can choose to view the violations occurring in just one Service. You can display Policy Incidents data in a Table view, or create a Chart view. It also provides easy access to filters, Saved Views, and allows you to schedule a report, and display policy details with a single click. 

To learn more about an incident, click to view Policy Incident Cloud Cards.

This page replaces the Policy Violations page. 

Table View

The Policy Incidents page Table view is the default view. 
policy_incidents_page_5.5.1.png

The Policy Incidents page provides the following information and actions:

  • Search. Search via the Omnibar. You can search for multiple incident IDs by entering a comma-separated query in the Omnibar.
  • Filters. Select options on the Filters tab to scope down your search. 
  • Views. Select the Views tab to use Saved Views created by you or shared with you by another user to reuse specified search parameters from a previous search on current data. 
  • Date Picker. Use the Date Picker to select a preset or custom date range to display data from only this date range.
  • Save View. Click to create a Saved View from your search query. 
  • Actions. Click Actions to:
    • Change Owner
    • Change Status
    • Delete Incidents. Select the checkboxes for incidents you want to delete. Then click Delete in the confirmation dialog. This action can't be undone. Large requests might take a few moments to process.
    • Select Response
    • Create Report
      • Business Report (PDF). Create a PDF report and run it immediately, which then appears in the Report Manager
      • CSV. Create a CSV report and run it immediately, which then appears in the Report Manager
      • XLS.  Create an XLS report and run it immediately, which then appears in the Report Manager
      • Schedule. Schedule a report to run later, which then appears in the Report Manager
      • Vulnerability Report. Generate a report for Container Incidents and Vulnerabilities. For details, see Report - Vulnerabilities
      • User Risk Report. Generate and download a User Risk Report to identify high, medium, and low-risk users for sanctioned services in your organization. You can generate or schedule a report, and access the generated reports via email or in the Report Manager.

NOTES: 

  • User Risk Report includes data from the last 100 days.
  • You cannot view the Filters configured for the User Risk Report on the Schedule Report page.

                 Generate User Risk Report includes the following options:

  • Generate Report. Click to generate a report. By default, the report is generated in the CSV file format. The report's title includes the report's name, current date, and time. For example, User Risk Report 10_09_23 1_56_50 PM UTC.
  • Select your report format. Select CSV or XLSX file formats to generate a report.
  • Schedule. (Optional) Schedule a report to run later, which then appears in the Report Manager.

An email is sent to the recipients with a link to download the report from Report Manager, and the report is attached if the size is less than 25 MB. The report includes user details such as username, user email, user risk score, number of incidents, threats, anomalies, activities, Active Directory (AD) attributes, and more.

  • Settings 
    • Edit Table Columns. You can edit table columns and save your changes as a Saved View
  • Severity. Severity level of the incident: Critical, Major, Minor, Information, or Warning. 
  • Policy Name. The name of the policy was given when it was created. 
  • Item Name. Item or file that violated the policy. If a link is available, you can click to download it. For more information, see Large File Download
  • User Name. The name of the user that caused the violation. 
  • Incident Created On. Date and time the incident was created. 
  • Incident Response. For Sanctioned applications, the Incident Response column displays the configured DLP response to the incident. 

NOTE: For Shadow/Web applications, the Incident Response column displays the response actions configured in SWG for web traffic.

  • Incident StatusStatus of the incident. 
  • Service Name. The name of the Cloud Service Provider the incident pertains to. 
  • Instance Name. The name of the instance that the incident pertains to. 

Other available table columns include:

  • Account ID
  • Account Name
  • Activity
  • CIS Level
  • Comments
  • Device ID
  • Device IP
  • Device Managed
  • Device Type
  • Event ID. When an event triggers multiple policies, and incidents are generated, the Event ID links all these incidents. If no Event ID is available, that means the incident was generated before Skyhigh CASB 4.4.0, when this feature was introduced. 
  • External Collaborators. Modified external collaborators are not shown in the column after a policy action is performed on the Cloud Card. 
  • External Collaborators Count
  • File Size
  • File Type
  • Incident ID
  • Incident Type
  • Incident Updated On
  • Internal Collaborators
  • Item Created On
  • Item Id
  • Item Modified On
  • Item Type
  • Malware Category Name
  • OS
  • Owner
  • Path
  • Quarantine Status
  • Recipient Domains. Displays the domain names of the recipient addresses. For example, if an outbound email is sent to Xyz@skyhigh.com and Cba@hpe.com then only the domain names such as hpe.com, skyhigh.com are listed in this column.
  • Remediation Response
  • Remediation Status
  • Resolution Action
  • Scan Name
  • Scan Run Date
  • Shared Link
  • Source
  • Total Match Count
  • User Agent
  • Vulnerabilities
  • Unique Match Count. The total number of unique matches for the incident.

Sanctioned Attributes. The Policy Incidents table columns might also reflect up to 10 mapped Sanctioned Attributes from Active Directory uploaded by Enterprise Connector. When mapped, you can also search for these Attributes using the Omnibar. But note, if the mapping changes, that affects what you can see and do with these Attributes. For help mapping AD attributes, contact Skyhigh CASB Support

When Multi-Instance Support is enabled, in the main table, the Service Name column is replaced with the Instance Name column, so that you can identify one instance from another. 

NOTE: In the Response column, Archived policy violations do not appear in table results unless you explicitly filter for them in the Omnibar. 

Chart View

To display your Policy Incidents data in a chart, click the Chart icon, under the Omnibar. 

policy_incident_chart_3_6_2.png

To display Policy Incidents data in a chart:

  1. Select an item from the Show list to determine the X-axis of your chart. 
  2. Select an item from the By list to determine the Y-axis of your chart. 
  3. In the Dimension By dialog, select All Data, select Top 10, or select up to 10 items from the list. Then click Done
    policy_incidents_summary_dimensions_3.7.1.png
  4. From the In a list, select the type of chart available: 
    • Trend. Line or vertical bar chart.
    • Breakdown. Donut or horizontal bar chart. 
      Your data is displayed in the chart. 
      To edit your chart's Dimension By data, click Edit.

 

  • Was this article helpful?