icon-zws.svg
Workflow Automation

Responding to a User Digest Notification

The format of the notification might not be the same as illustrated in this article. It depends upon the digest notification template that your organization configured in the Workflow Automation Admin Portal.

If a channel (e.g., Email, Slack, or Teams) is enabled for the User Digest notification flags on the Account Settings page, Workflow Automation uses a digest notification template to generate and send a user digest notification daily via that channel to all users who have incidents assigned to them. The Workflow Automation Admin Portal provides default user digest notification templates (Digest - Email Template, Digest - Slack Template, and Digest - Teams Template) that you can clone and use for these notifications. These default digest notifications list the number of all open incidents and the number of open incidents that have a high priority. They also provide a link to the Incidents page, where the user can manage these incidents. The digest notifications contain the same information, but the format of the message and where it is delivered varies depending on the channel. To learn more, see Managing Account Settings, Managing Notification Templates, and Managing Incident and Digest Template Mappings.

Viewing the User Digest Notification

If you have incidents that are open or in progress, a digest notification (e.g., email, Slack message, or Microsoft Teams message) is sent to you. The digest notification contains the following information:

  • The number of open and in-progress incidents that require your attention.
  • The number of high-priority incidents that require your attention.
  • A link to the Incidents page, where you can view a list of your assigned incidents and also take a survey to justify or approve the incidents. This link is only valid for 24 hours.

The incident count provided in the message is accurate as of the date and time the notification is generated. However, the count is subject to change as new incidents are created, reassigned, or resolved.

The following images are examples of a digest notification email, Slack message, and Microsoft Teams message. The digest notifications contain the same information, but the format of the message is different.

Your email settings might tag the digest notification emails as spam and send them to your spam folder. Change your settings to receive the digest notification emails directly in your inbox.

Viewing the Incidents

To view your assigned incidents, click the View all incidents assigned to me link provided in the use digest notification. The Incidents page appears, listing all the open or in-progress incidents that require your attention. For each incident, you can view the following information:

  • Last Change Date: The date and time the incident was last changed.
  • Transaction ID: The transaction ID for the incident.
  • Status: The status of the incident. Statuses are:
    • New
    • Investigating
    • Validating with User
    • Justification Response Received
    • Escalated
  • Action: The action required for the incident. Actions are:
    • Justify: When you click this action, you are redirected to the Justify page, where you can view the incident details and complete the justification survey for the incident.
    • Approve: When you click this action, you are redirected to the Approve page, where you can view the incident details and complete the approval survey for the incident.

To view only the incidents where you are the owner, select the My Incidents checkbox at the top-left of the page.

Viewing the Incident Details

To view the details of an incident, on the Incidents page, click the Justify or Approve action next to the incident. You are redirected to either the Justify or Approve page, where you can view the following details:

  • In the Overview section, you can see:

    • Incident ID: The ID of the incident.
    • Incident Date: The date on which the incident occurred.
    • Severity: The severity of the incident. This field is not available for incidents with a Source DLP type of Email.

    Close
  • In the Violation Details section, you can see:

    The attributes that appear under the Originating User subsection can vary, depending on what information was imported to Workflow Automation and whether it was imported via the primary user data source of System for Cross-domain Identity Management (SCIM) or a CSV file. To learn more, see Managing Account Settings, Managing User Attributes, and SAML & SCIM Configuration Guide for Microsoft Entra ID.

      • Originating User:

        • Name: The name of the end user responsible for the incident. If you choose the User Name attribute for obfuscation, multiple asterisks appear in this field.
        • Client IP: The client IP address of the end user. If you choose the Client IP attribute for obfuscation, multiple asterisks appear in this field.
        • Manager Name: The name of the user's manager. If you choose the Manager Name attribute for obfuscation, multiple asterisks appear in this field.
        • Manager Email: The email address of the manager. If you choose the Manager Email attribute for obfuscation, multiple asterisks appear in this field.
        • Employee Number: The employee number of the end user.
        • Department: The department of the end user.
        • Home Location: The home location of the end user.
        • Work Location: The work location of the end user.
        • Additional Information: Displays the user attributes associated with the end user responsible for the incident. To view the additional user attributes:
          1. Click the link provided in this field. The Additional Information window appears.
          2. In the Additional Information window, you can view data associated with the incident, such as end user attributes, manager attributes, and addresses. If you choose user attributes for obfuscation, these obfuscated attributes appear with multiple asterisks in this window.

            The additional information is fetched from the primary user data source (i.e., CSV or SCIM) you selected during the incident generation.

            For example, if you select CSV as the primary user data source during the incident generation, the Additional Information window displays the user attributes fetched from the imported CSV file. To learn more, see Managing Account Settings.

            The additional information displayed for an incident does not change if you alter the primary user data source. Changing the primary user data source settings impacts only new incidents.

        To learn more about user data obfuscation, see Managing Account Settings and Managing Admin Assignments.

      • Policy:
        • Rules: The DLP rules that the end user violated (e.g., Block-HIPAA).
        • Engines: The DLP engines associated with the incident.
        • Dictionaries with Match Count: The DLP dictionaries associated with the incident. The number of times the end user's traffic violated a specific dictionary is displayed in brackets (e.g., Medical Information[2]).
        • Other Matched Rules: Click this field to display the rules that the incident violated, in addition to the primary rules that caused the incident. This field is only available for incidents of Source DLP type Inline and Endpoint.

      The policy fields are only available if the Hide Policy Details - End User field is not selected on the Zscaler DLP Integration page or the Zscaler DLP Azure Integration page in the Workflow Automation Admin Portal. To learn more, see Configuring the DLP Application Integration Using Amazon Web Services and Configuring the DLP Application Integration Using Azure.

      • Content:
        • File Name: The name of the file.
        • File Type: The type or extension of the file.
        • File MD5: The 32-character MD5 hash of the file.
      • Application:
        • URL: The URL of the application.
        • Name: The name of the application.
        • Category: The category of the application.

      The following image is an example of the Violation Details section for an Inline incident. The information that is displayed in the Violation Details section varies depending on the type of incident.

      Close
      • Originating User:

        • Name: The name of the end user responsible for the incident. If you choose the User Name attribute for obfuscation, multiple asterisks appear in this field.
        • Manager Name: The name of the user's manager. If you choose the Manager Name attribute for obfuscation, multiple asterisks appear in this field.
        • Manager Email: The email address of the manager. If you choose the Manager Email attribute for obfuscation, multiple asterisks appear in this field.
        • Department: The department of the end user.
        • Work Location: The work location of the end user.
        • Additional Information: Displays the user attributes associated with the end user responsible for the incident. To view the additional user attributes:
          • Click the link provided in this field. The Additional Information window appears.
          • In the Additional Information window, you can view data associated with the incident, such as end user attributes, manager attributes, and addresses. If you choose user attributes for obfuscation, these obfuscated attributes appear with multiple asterisks in this window.

            The additional information is fetched from the primary user data source (i.e., CSV or SCIM) you selected during the incident generation.

            For example, if you select CSV as the primary user data source during the incident generation, the Additional Information window displays the user attributes fetched from the imported CSV file. To learn more, see Managing Account Settings.

            The additional information displayed for an incident does not change if you alter the primary user data source. Changing the primary user data source settings impacts only new incidents.

        To learn more about user data obfuscation, see Managing Account Settings and Managing Admin Assignments.

      • Policy:
        • Rules: The DLP rules that the end user violated (e.g., Block-HIPAA).
        • Engines: The DLP engines associated with the incident.
        • Dictionaries with Match Count: The DLP dictionaries associated with the incident. The number of times the end user's traffic violated a specific dictionary is displayed in brackets (e.g., Medical Information[2]).

      The policy fields are only available if the Hide Policy Details - End User field is not selected on the Zscaler DLP Integration page or the Zscaler DLP Azure Integration page in the Workflow Automation Admin Portal. To learn more, see Configuring the DLP Application Integration Using Amazon Web Services and Configuring the DLP Application Integration Using Azure.

      • Content:
        • File Name: The name of the file.
        • File Type: The type or extension of the file.
        • File MD5: The 32-character MD5 hash of the file.
        • File Size: The size of the file.
      • Application:
        • Name: The name of the application.
        • Category: The category of the application.

      The following image is an example of the Violation Details section for a SaaS Security incident. The information that is displayed in the Violation Details section varies depending on the type of incident.

      Close
      • Originating User:

        • Name: The name of the end user responsible for the incident. If you choose the User Name attribute for obfuscation, multiple asterisks appear in this field.
        • Manager Name: The name of the user's manager. If you choose the Manager Name attribute for obfuscation, multiple asterisks appear in this field.
        • Manager Email: The email address of the manager. If you choose the Manager Email attribute for obfuscation, multiple asterisks appear in this field.
        • Department: The department of the end user.
        • Device Name: The name of the end user's device.
        • Device OS: The operating system of the end user's device.
        • Device Trust Level: The trust level of the end user's device.
        • Additional Information: Displays the user attributes associated with the end user responsible for the incident. To view the additional user attributes:
          • Click the link provided in this field. The Additional Information window appears.
          • In the Additional Information window, you can view data associated with the incident, such as end user attributes, manager attributes, and addresses. If you choose user attributes for obfuscation, these obfuscated attributes appear with multiple asterisks in this window.

            The additional information is fetched from the primary user data source (i.e., CSV or SCIM) you selected during the incident generation.

            For example, if you select CSV as the primary user data source during the incident generation, the Additional Information window displays the user attributes fetched from the imported CSV file. To learn more, see Managing Account Settings.

            The additional information displayed for an incident does not change if you alter the primary user data source. Changing the primary user data source settings impacts only new incidents.

        To learn more about user data obfuscation, see Managing Account Settings and Managing Admin Assignments.

      • Policy:
        • Rules: The DLP rules that the end user violated (e.g., Block-HIPAA).
        • Engines: The DLP engines associated with the incident.
        • Dictionaries with Match Count: The DLP dictionaries associated with the incident. The number of times the end user's traffic violated a specific dictionary is displayed in brackets (e.g., Medical Information[2]).
        • Other Matched Rules: Click this field to display the rules that the incident violated, in addition to the primary rules that caused the incident. This field is only available for incidents of Source DLP type Inline and Endpoint.

      The policy fields are only available if the Hide Policy Details - End User field is not selected on the Zscaler DLP Integration page or the Zscaler DLP Azure Integration page in the Workflow Automation Admin Portal. To learn more, see Configuring the DLP Application Integration Using Amazon Web Services and Configuring the DLP Application Integration Using Azure.

      • Content:
        • File Name: The name of the file.
        • File Type: The type or extension of the file.
        • File MD5: The 32-character MD5 hash of the file.
        • File Size: The size of the file in bytes.
      • User Activity:
        • Activity Type: The type of activity that the user performed that caused the incident.
        • Channel: The type of channel (e.g., Network Drive Transfer or Remote Drive Transfer) that the user used to cause the incident.
        • Source: The source of the incident.
        • Destination: The destination of the incident.
        • Source Type: The source type of the incident.
        • Destination Type: The destination type (e.g., Removable Storage Device) for the incident.
        • Source Location: The source location of the incident.
        • Destination Location: The destination location for the incident.
        • ZDP Mode: The Zscaler Data Protection (ZDP) mode for the incident. ZDP modes can be Block or Exemption.
        • Expected Action: The expected action by the ZDP mode for the incident.
        • Confirm Action: The action that the user took when prompted with a confirmation dialog box for the incident creation.
        • Confirm Justification: The justification that the user provided during incident creation.
        • Additional Information: Additional information or notes about the incident.

      The following image is an example of the Violation Details section for an Endpoint incident. The information that is displayed in the Violation Details section varies depending on the type of incident.

      Close
    • Originating User:

      • Name: The name of the end user responsible for the incident. If you choose the User Name attribute for obfuscation, multiple asterisks appear in this field. To learn more about user data obfuscation, see Managing Account Settings and Managing Admin Assignments.
      • Email Subject: The subject of the email.
      • Application Name: The name of the application used to create the email.
      • Additional Information: Displays the user attributes associated with the end user responsible for the incident. To view the additional user attributes:
        • Click the link provided in this field. The Additional Information window appears.
        • In the Additional Information window, you can view data associated with the incident, such as end user attributes, manager attributes, and addresses. If you choose user attributes for obfuscation, these obfuscated attributes appear with multiple asterisks in this window.

          The additional information is fetched from the primary user data source (i.e., CSV or SCIM) you selected during the incident generation.

          For example, if you select CSV as the primary user data source during the incident generation, the Additional Information window displays the user attributes fetched from the imported CSV file. To learn more, see Managing Account Settings.

          The additional information displayed for an incident does not change if you alter the primary user data source. Changing the primary user data source settings impacts only new incidents.

      The following image is an example of the Violation Details section for an Email incident. The information that is displayed in the Violation Details section varies depending on the type of incident.

      Close
    Close
  • This section is only available for incidents of Source DLP type Email. For other types of incidents, the policy information for the incident appears in the Violation Details section.

    In the Policy section, you can see:

    • Recipients Email: The email address of the user who received the incident. If you choose the Recipient Email attribute for obfuscation, multiple asterisks appear in this field. To learn more about user data obfuscation, see Managing Account Settings and Managing Admin Assignments.
    • Rule: The DLP rule that the end user violated.
    • Other Matched Rules: The other rules that the incident violated in addition to the primary DLP rule that caused the incident.

    Close
  • The Generate Presigned Link field is not available for incidents of Source DLP type Email.

    In the Violation Content section, you can see:

    • When justifying an incident, this field is available only if the Hide Trigger Data - End User field is not selected for the DLP integration. When approving an incident, this field is available only if the Hide Evidence Data - Manager/Approver field is not selected for the DLP integration.

      This field displays the data that triggered the incident. The prefix and suffix for the trigger data are displayed along with the trigger data itself. The actual trigger data portion is highlighted. You can view the DLP dictionaries, DLP rules, and DLP engines associated with the incident and the exact data that violated the DLP policies.

      Close
    Close

Completing the Survey

After reviewing the incident details, you might be required to complete the survey at the end of the Justify or Approve page to justify, approve, or suggest the next steps for the incident.

To respond, complete the following survey and then click Submit:

  • Justification Type: Select a justification type for the incident. Justification types are False Positive, Manager Approved, and Others.
  • Justification Reason: Enter a response to proceed with the incident.

Your response is sent to the organization's admin investigating the incident for further review.

Related Articles
Managing IncidentsViewing & Managing Incident DetailsUnderstanding Duplicate Incidents in Workflow AutomationUsing Incident Filters in Workflow AutomationResponding to an End User NotificationResponding to an Escalation NotificationResponding to a User Digest NotificationResponding to a DLP Admin Digest Notification