Skip to content

AI security

The AI security report dashboard summarizes your organization's AI usage and potential security risks.

To view the AI security report dashboard:

  1. In the Cloudflare dashboard, go to Zero Trust > Insights.
  2. Go to Dashboards.
  3. Select AI security report.

Refer to Insights overview to learn how to use Analytics dashboards together with Analytics Overview and Digital Experience Monitoring (DEX) for complete visibility and troubleshooting.

Prerequisites

To populate the AI security report dashboard, you must have:

Available insights

The AI security report dashboard includes the following panels and metrics:

Top 5 visited AI applications by user count

Displays the most accessed AI tools in your organization and the number of users visiting each application in a time-series graph.
Each bar represents user activity for a specific AI application (for example, ChatGPT or Gemini) over time.

Use this chart to monitor adoption trends and detect new or unauthorized AI tools being accessed.

Statuses applied to AI applications by application count

Reports the total number of AI applications identified and their review statuses.
Statuses include:

  • Unreviewed — Applications not yet evaluated by administrators.
  • In Review — Applications currently under review for approval.
  • Unapproved — Applications that are restricted or blocked.
  • Approved — Applications explicitly permitted for organizational use.

Data uploaded to Artificial Intelligence applications by status

Reports the amount of data transferred to AI tools, broken down by review status (Unreviewed, In Review, Unapproved, Approved).
Use this report to understand whether sensitive data is being sent to unapproved or unreviewed AI applications.

MCP servers behind Access over time

Displays the number of Model Context Protocol (MCP) servers protected by Cloudflare Access policies over time. Use this panel to verify that newly deployed MCP servers are protected.

Access login events to MCP servers

Reports the number of login events to MCP servers protected by Access policies. Use this panel to identify unusual login patterns, such as spikes in access from unexpected users.