: New Features Introduced in January 2024
Focus
Focus

New Features Introduced in January 2024

Table of Contents

New Features Introduced in January 2024

Learn about the new features that became available in SaaS Security starting January 2024.
The following table provides a snapshot of new features introduced for SaaS Security in January 2024. Refer to the Administrator’s Guide for more information on how to use Data Security, SaaS Security Inline, and SaaS Security Posture Management (SSPM).
Feature
Description
Allowed List of IP Addresses
For a smooth app onboarding experience, an updated region-specific IP address list is now available. Add these IP addresses to the allowed list in your firewalls.
Onboarding Validations
Users can now check onboarding status that validates if the connector has onboarded successfully and fetched sample assets and user activities. Failures are reported with appropriate errors so that quick actions can be taken reducing troubleshooting time significantly. These validations are launched for the following connectors.
Improvements to tenant-level policy rule recommendations
Tenant-level policy rule recommendations, if committed on the firewall, affect only the application tenants identified in the recommendation. When you create policy rule recommendations at the tenant level, the following improvements are now available:
  • You can now select up to 30 individual tenants per policy recommendation. Previously, the limit was 10 individual tenants.
  • You can now specify the Allow action in a policy recommendation. The Allow action explicitly permits network traffic on selected tenants. We designed the explicit Allow action for you to use in a policy recommendation only when you also define another policy recommendation to Block activities for the remaining tenants. Pairing Allow and Block policy recommendations is a convenient way to block activities on most tenants while allowing the activities on a smaller set of tenants.
    The Allow action is available for Box, and will be made available for more applications that support tenant-level policy recommendations.
Tenant-level visibility and control for Salesforce Sales Cloud
For certain discovered applications, SaaS Security Inline can detect the specific application tenants that are being accessed by users. SaaS Security Inline leverages this capability to provide you with visibility and control at the tenant level for the supported applications. This capability is now extended to support Salesforce Sales Cloud applications. For Salesforce Sales Cloud applications, you can now submit policy rule recommendations at the tenant level. The policies, if committed on the firewall, will affect only the application tenants identified in the policy recommendation.
Support for Custom Admin Roles in Data Security
You can now create Custom Admin Roles for Data Security in the Strata Cloud Manager. With this launch, you have the extended capability of managing the Role-Based Access Control leveraging the Identity and Access Management (I&AM) central framework for complete authentication and authorization.
Autotagging recommendations for Sanctioned apps
To help you identify discovered apps that you should tag as Sanctioned, SaaS Security Inline now provides tagging recommendations. Using information from the Cloud Identity Engine, SaaS Security Inline determines if a detected app is an enterprise application accessible through your identity provider. If the app is an enterprise application, SaaS Security Inline will recommend that you tag the app as Sanctioned.
From the Discovered Applications view in SaaS Security Inline, you can review the tagging recommendations. You can either accept the recommendation to tag an app as Sanctioned, or you can reject the recommendation and apply a different tag instead.
New Security and Privacy attributes
When you are viewing an application's attribute values in the Application Detail view in SaaS Security Inline, three new Security and Privacy attributes are available:
  • Encryption Strength at Rest: If data managed by the SaaS application is encrypted, this attribute identifies the encryption strength.
  • Protected from Downgrade Attacks: This attribute indicates whether the SaaS application is protected from TLS downgrade attacks.
  • Spoof Risk Level: This attribute identifies how well the SaaS application domain is protected from domain spoofing.
In addition to these new attributes, the Session Timeout attribute now displays more precise information.
Tenant-level visibility and control for Aha! (Aha.io)
For certain discovered applications, SaaS Security Inline can detect the specific application tenants that are being accessed by users. SaaS Security Inline leverages this capability to provide you with visibility and control at the tenant level for the supported applications. This capability is now extended to support Aha! (Aha.io) applications. For Aha! applications, you can now submit policy rule recommendations at the tenant level. The policies, if committed on the firewall, will affect only the application tenants identified in the policy recommendation.
Improved application searching in SaaS Security Inline
The search function in SaaS Security Inline has been improved to yield better results when searching for applications. For example, when searching the Application Dictionary, more likely targets will be returned higher in the search results. These search improvements have been realized for the Application Dictionary and Discovered Applications views, and for the Create New Policy Recommendation page.