: Begin Scanning a ShareFile App
Focus
Focus

Begin Scanning a ShareFile App

Table of Contents

Begin Scanning a ShareFile App

Scan a ShareFile App
To begin scanning a ShareFile application:
Support for automated remediation capabilities varies by SaaS application.
  1. Add your ShareFile domains as an internal domain on Data Security.
    The domain name can have multiple formats, such as YourSubdomain.citrixsharefile.com. See Define Your Internal Domains.
  2. To add the ShareFile app, go to Data SecurityApplicationsAdd ApplicationShareFile .
    1. Enter the login credentials for an account with administrative privileges on the ShareFile page to which you're redirected to enable communication between Data Security and the ShareFile apps.
    2. Review and Accept the changes so that Data Security can perform scans on your assets in ShareFile.
      Upon successful authentication, the new ShareFile app is added to the list of Cloud Apps as ShareFile n, where n is the number of ShareFile app instances that you have connected to Data Security, for example ShareFile1.
  3. (Optional) Give a descriptive name to this app instance.
    1. Select the ShareFile instance on the Cloud Apps list.
    2. Enter a descriptive Name to differentiate this instance of ShareFile from other instances you're managing.
    3. Click Done to save your changes.
  4. Add policy rules.
    When you add ShareFile, Data Security automatically scans the app against the default data patterns and displays the match occurrences. As a best practice, consider the business use of your app to determine whether you want to Add a New Data Asset Policy to look for incidents unique to the ShareFile.
  5. (Optional) Configure or edit a data pattern.
    Refer to Configure Data Patterns to identify specific strings of text, characters, words, or patterns to make it possible to find all instances of text that match a data pattern you specify.
  6. To start scanning the new ShareFile app for risks, go to Data SecurityApplicationsShareFileEnable Scanning.
  7. Monitor the results of the scan.
    As Data Security scans files and matches them against enabled policy rules, you can Monitor Scan Results on the Dashboard to verify that your policy rules are effective. Monitoring the progress of the scan during the discovery phase allows you to Fine-Tune Policy to modify the match criteria and ensure better results.