Introducing Security gaps
Coro's Security gaps helps you identify and resolve workspace misconfigurations that are not aligned with Coro's best practices and might reduce protection. You can monitor these gaps and take corrective action to maintain a unified security posture across users, devices, cloud applications, and workspaces. Security gaps are grouped by type, and most include corrective steps you can apply with a single action.
Important
Managed Service Provider (MSP) admin users with sufficient permissions can also access global security gaps to view and manage gaps across parent and descendant workspaces.
Use Security gaps to:
- Continuously monitor for workspace misconfigurations.
- Detect misconfigurations across users, device policies, cloud applications, endpoint security, email protection, and workspace labels.
- Fix misconfigurations using automated or manual actions.
Important
Security gaps highlight areas where workspace configurations are incomplete or not aligned with Coro's best practices. They are not threat detections.
Coro surfaces opportunities to improve security by detecting areas where configurations might be incomplete or protections not fully applied, including but not limited to:
- Endpoint security settings on user devices.
- Scheduled scans for sensitive data.
- Assigning protected users.
- Enabling email threat scanning.
Accessing Security gaps
Important
Viewing and resolving security gaps depends on your assigned admin user role:
- No Access : You cannot view or take corrective action on the gap.
- Can View : You can view the gap but not take corrective action.
- Can Edit : You can view the gap and take corrective action.
For further information, see Managing workspace roles and permissions.
To access Security gaps:
- Sign in to the Coro console .
-
From the
Actionboard
, select
Security gaps
:
Coro displays the Security gaps page:
On this page, you can:
- Review active and ignored gaps for your workspace.
- Take corrective action.
- Filter gaps by type and state.
Coro displays the following details for each listed gap:
- Gap type.
- Number of workspaces affected by the gap.
- Gap name and description.
For more information, see Managing security gaps.