About Discovering Shadow Applications

Learn about options for discovering and viewing shadow, or stealth applications.

What Are Shadow Applications?

Applications or plug-ins that don't have explicit organizational approval are known as shadow or stealth applications.

Oracle CASB Cloud Service — Discovery monitors application usage in cloud applications it's monitoring and displays information about the risks for each application. You can also download a list of the application's users for further analysis.

How Do I Enable Oracle CASB Cloud Service — Discovery?

If there is no Discovery option on the Navigation menu you log in to the Oracle CASB Cloud Service console, you will have to request that it be enabled for your tenant. Contact Oracle Support (http://support.oracle.com).  If you have not registered yet, you will need your Customer Support Identifier (CSI) in order to register to submit service request tickets.  As an alternative, you can also contact your Oracle CASB Customer Success Manager.

What Firewalls Are Supported?

With the Discovery option on the Navigation menu in the Oracle CASB Cloud Service console:
  1. Select Discovery from the Navigation menu.

  2. Click the Import from Logs button.

    The Upload log file for analysis dialog box lists the firewalls that are currently supported.

If your firewall is not enabled, contact Oracle Support (http://support.oracle.com).  If you have not registered yet, you will need your Customer Support Identifier (CSI) in order to register to submit service request tickets.  As an alternative, you can also contact your Oracle CASB Customer Success Manager.

You must provide a sample log file from your firewall to Oracle Support.

The sample log file should contain a representative sample of the traffic through your firewall that involves applications or plug-ins that do not have explicit organizational approval. For a list of the fields that are required for processing by Oracle CASB Cloud Service — Discovery, see Required Log Fields.

Why Upload a Single Log File?

Although it is not required, it is highly recommended that you manually upload a sample log file from your firewall before attempting to set up automatic upload of log files. The manual log file upload:

  • Is easy to execute — all you need is a sample log file from your firewall.

  • Provides an opportunity to quickly detect and correct problems that you would otherwise encounter in the automatic upload.

For more information on manually uploading a single firewall log file, see Manually Uploading a Log File.

What Is Involved in Setting Up Automatic Upload of Log Files?

For more information on setting up ongoing, automatic upload of firewall log files, see Setting Up Automatic Upload of Log Files.