Problem
You need to prevent specific users from accessing particular applications based on criteria. For example, you may want users to be able to access Drive only from a particular IP address.
Context aware access (CAA) has monitor mode, letting you turn on the CAA to see the impact before taking it live.
In this example, we'll investigate who is using the Originality reports and the usage occurrences.
Steps
- Open the Investigation Tool.
Security > Security center > Investigation tool - Search for or select Context Aware Access log events from the drop-down as your data source.
- Click Search. The results appear at the bottom of the page. Here, the results are a list of all context aware access.
The CAAs that are in Monitor mode contain Monitor mode in the event name. - If you are happy with the investigation you built and want to retain it, click Save Investigation, located on the right.
See our full list of Investigation tool recipes.
Document Version | Date | Description of Change |
1.0 | 1/13/2024 | Original Publish |