Identify Malware in data repositories and action per defined policy

Identify Malware in data repositories and action per defined policy
Prerequisites for the API protection use casesRoles/actors in the use cases
  • Tenant creation 
  • User accounts created
  • CASB API Protection connected to CSP (Cloud Service Provider)
  • CSP (Cloud Service Provider) administrator
  • Cloud governance team
  • Security Analyst

To enable malware scan in data repositories which are API protected services, follow the steps shown below:

  1. Navigate to Settings > Threat Protection > API enabled protection.
  2. Under Settings, click ‘Edit’ and select the options for actions to be taken based on severity of the malware.
  3. Enable the Malware scans for instances of the API protected services.
vrp_dlp_api_use_case_24.jpg

Edit Settings:

vrp_dlp_api_use_24b.jpg

To learn more: Understanding API Protection

Share this Doc

Identify Malware in data repositories and action per defined policy

Or copy link

In this topic ...