Corma
Book a callBlog
  • Get started - Setup & implementation
  • Concepts and use cases
    • On & Off boarding
      • Define app owners
      • Create app bundles
      • Onboard a user
      • Offboard a user
      • Track provisioning progress
    • Expenses
      • CSV expense import
      • Inserting expense data manually
      • OCR Expense import
      • Contract Management & License Status Breakdown
    • Discovering Shadow IT
    • Access Requests
    • Employee view
    • Adding Applications to Corma
    • Licenses
    • App Analytics
  • The browser extensions
    • How to deploy Corma extensions with Google admin console
    • How to deploy Corma extensions with Microsoft intune
    • How to deploy extensions using GPO
    • How to manually install the Corma extension and login
    • How to deploy Corma extensions with Jamf
  • Integrations
    • Identity and Access Management
      • Google workspace
      • Microsoft Entra ID
      • Okta
    • Finance and accounting
      • Pennylane
      • Spendesk
      • Qonto
      • Candis
    • HRIS
      • Factorial
      • Personio
      • Lucca
      • Payfit
      • BambooHR
      • Deel
      • Hibob
      • Rippling
      • Workday
    • SaaS applications
      • Slack
      • Atlassian
      • Miro
      • Notion
      • LastPass
        • LastPass connection tutorial
        • LastPass Audit Log Collection
      • 1Password
      • Github Enterprise
      • Aircall
      • Hubspot
      • Salesforce
      • Intercom
      • Zendesk
      • Figma
      • Adobe
      • Canva
      • Asana
      • Front
  • General documentation
    • What is Corma?
    • General tech information
    • The Corma Glossary
    • Corma Product Roadmap
  • Security
  • Helpdesk
  • Changelog
Powered by GitBook
On this page
  1. Concepts and use cases

Discovering Shadow IT

PreviousContract Management & License Status BreakdownNextAccess Requests

Last updated 4 months ago

Discover Corma’s Shadow IT functionality, designed to map unauthorised app usage across your teams and empower you to take proactive steps to mitigate security and compliance risks.

Access the Shadow IT Applications page by clicking the dedicated block in the Overview page or by navigating through the Applications page in the left-hand menu.

The dedicated Shadow IT Apps page displays all Shadow IT applications detected by Corma in a comprehensive table, providing the following details for each application:

  • The number of users using the app.

  • The app status: Unauthorized, Authorized, Tolerated, or To Review.

  • The sources of data collection: SSO, Browser Extension, or Direct Integration.

  • The number of open requests for the app.

  • The compliance risk level: Low, Moderate, or High.

Clicking the three dots in the last column opens a dropdown menu, providing quick access to several shortcut actions, as shown below with the application "June" as an example. These options allow admins to:

  • See the app in its dedicated page

  • Modify the app settings

  • Be redirected to the app

  • Delete the app