: Begin Scanning a Zoom App
Focus
Focus

Begin Scanning a Zoom App

Table of Contents

Begin Scanning a Zoom App

Authorize Data Security to connect to Zoom to scan all content shared within the app.
To connect a Zoom app and begin scanning assets, you need to:
  • Ensure that you have a Zoom account with Administrator role.
    Enable account-level audio transcription on Zoom.
  • Grant Data Security access to Zoom.
  • Add the Zoom app to Data Security, providing Data Security information about your Zoom account.
Support for automated remediation capabilities varies by SaaS application.

Add Zoom App

In order for Data Security to scan assets, you must consent to specific permissions during adding the Zoom app.
  1. Enable audio transcription on Zoom.
    Zoom supports audio transcript when you record on Cloud, not Local.
  2. (Recommended) Add your Zoom domain as an internal domain.
  3. Sign out of all Zoom accounts.
    Doing so ensures that you sign in under the correct account. Additionally, Chrome caches credentials. Log in using an Incognito window to avoid applying those cached credentials.
  4. To add the Zoom app, go to Data SecurityApplicationsAdd ApplicationZoom .
    1. Select Connect to Zoom Account.
    2. Enter your team’s Zoom domain, then Continue.
    3. Sign in to Zoom account with Administrator role.
    4. Review and Authorize the requested permissions.
      Data Security requires these permissions to scan your assets on Zoom.
      After authentication, Data Security adds the new Zoom app to the list of Cloud Apps as Zoom n, where n is the number of Zoom app instances that you have connected to Data Security. You’ll specify a descriptive name soon.

Troubleshooting Onboarding for Zoom App

To ensure that your app has onboarded correctly without any issues in authentication or permissions, Data Security performs validation checks between the onboarding and scanning process. You can start scanning only after a successful validation. For Zoom, the following validation happens:
  • Validating Permissions
After the validation is successful, Data Security displays the following:
If the Validating Permissions check fails, try the following:
  1. Ensure you have administrator permissions.
  2. Go to your Zoom app directory and check if your Palo Alto Networks application is listed in the list of installed apps. Following are the app names for specific regions:
    • India region: SAAS Security API for Zoom - IN
    • Australia region: SaaS Security API for Zoom -AUS
    • Japan region: Palo Alto Networks NG-CASB - JP
    • UK region: Palo Alto Networks NG-CASB - UK
    • EU region: SaaS Security API for Zoom EU
    • APAC region: SaaS Security API for Zoom - APEC
    • US region: SaaS Security API for Zoom - US
Handling Errors
The most common issue related to onboarding a Zoom App is given in the following table:
Symptom
Explanation
Solution
Audio transcript (.VTT) assets don't display in SaaS Security web interface.
Data Security can't detect audio transcripts if you don’t have audio transcript enabled on Zoom.
Enable audio transcript as outlined in Add Zoom App.
If the issue persists, contact SaaS Security Technical Support.

Customize Zoom App

After you add the Zoom app, customize the app to make use of capabilities that are unique to this app or that differentiate this app instance from others.
  1. (Optional) Give a descriptive name to this app instance.
    1. Select the Zoom n link on the Cloud Apps list.
    2. Enter a descriptive Name to differentiate this instance of Zoom from other instances.
    3. Click Done to save your changes.
  2. Next step: Proceed to scanning and monitoring results.

Start Scanning and Monitor Results

When you add a new cloud app, then enable scanning, Data Security automatically scans the cloud app against the default data patterns and displays the match occurrences. You can take action now to improve your scan results and identify risks.
  1. To start scanning the new Zoom app for incidents, go to Data SecurityApplicationsZoomEnable Scanning.
  2. Monitor the scan results.
    During the discovery phase, as Data Security scans files and matches them against enabled policy rules:
    • Verify that Data Security displays assets.
    • Verify that your default policy rules are effective. If the results don’t capture all the risks or you see false positives, proceed to the next step to improve your results.
  3. (Optional) Modify match criteria for existing policy rules.
  4. (Optional) Add new policy rules.
    Consider the business use of your cloud app, then identify risks unique to your enterprise. As necessary, add new:
  5. (Optional) Configure or edit a data pattern.
    You can Configure Data Patterns to identify specific strings of text, characters, words, or patterns to make it possible to find all instances of text that match a data pattern you specify.