Skip to main content

Suspicious SaaS Activities

The Suspicious SaaS Activities page lists users who have access to one of your various applications, but these users are not currently active on your Human Resources (HR) roster. This page displays all suspicious activities across all applications managed in SaaS Management. The suspicious activities data is updated once a day and only contains usage within the last 30 days.

Accessing Suspicious SaaS Activities

To access the Suspicious SaaS Activities page, go to the SaaS menu and select Suspicious SaaS Activities .

Suspicious SaaS Activities Tasks

The following links describe the Securing SaaS User Accounts tasks you can perform on this page:

Suspicious SaaS Activities UI Overview

The following tables describe the Suspicious SaaS Activities types, buttons, and table columns.

Suspicious Activity Types

The following table describes the two suspicious activity types and the option for SaaS Management Administrators to identify unrecognized suspicious activities as recognized.

Suspicious Activity TypeDescription
UnauthorizedA user is inactive in the HR Roster and is using an application.
UnrecognizedA user is not listed in the HR Roster and is using an application.
RecognizedThis option is only used by a SaaS Management Administrator to identify unrecognized suspicious activities as recognized. Examples: A Salesforce user is not listed in an organization’s HR Roster. However, the SaaS Management Administrator recognizes the user as a customer who has submitted a support ticket. A contractor with valid credentials is not listed in your HR Roster. A user has an email alias that does not match the user’s email address listed in your HR Roster.

Suspicious Activity Buttons

The following table describes the Suspicious Activity buttons.

ButtonDescription
SelectDisplays the suspicious activity types and filters the Activity Type column information based on the chosen activity type.
Show FiltersReveals columns that have search or filters.
Clear AllClears search terms in grid column searches.
Export CSVExports a listing of your Suspicious Activities based on your chosen column and filtering options.

Suspicious Activities Table Columns

The following table explains the Suspicious Activities table columns.

ColumnDescription
UserEither: The user’s email address displays. The user’s unique ID displays when an email address is not returned from the application’s API integrated with SaaS Management.
First NameEither: The user’s first name displays. This column is blank or information other than the user’s first name displays. This event occurs when the user’s first name was not returned from the application’s API integrated with SaaS Management.
Last NameEither: The user’s last name displays. This column is blank or information other than the user’s last name displays. This event occurs when the user’s last name was not returned from the application’s API integrated with SaaS Management.
AppLinks to the application’s Overview Tab .
Activity TypeInformation is filtered based on the activity type chosen from the Select button.