Discover Shadow IT
Table of Contents
Overview
Shadow IT is comprised of, among other things, the unauthorized use of cloud applications without formal IT approval. These tools are typically discovered through employee browser activity, SSO logins, or invoice analysis, which reveal unmanaged or rejected applications.
The appropriate handling of Shadow IT within your organization can help you with the following issues:
- Reduces security and compliance risks
- Highlights unaudited software usage
- Enables proactive vendor management
- Helps consolidate overlapping tools
Discover Shadow IT
To discover unauthorized SaaS applications and licenses in your environment, follow these steps:
- Go to Home > SaaS Management.
- Refer to the following widgets:
- New Applications: Shows the number of applications discovered in the last 30 days.
- Applications per Status: Shows applications grouped according to their status and indicates their number in comparison to the total number of applications.
- Go to Technical Inventory > SaaS Applications.
- Use the Status column to applications who are still marked as Discovered and need to be reviewed, or as Rejected, and need to be removed from the environment.