<?xml version="1.0" encoding="UTF-8"?><oembed><type>video</type><version>1.0</version><html>&lt;iframe src=&quot;https://www.loom.com/embed/700987661c47461190c619e608697768&quot; frameborder=&quot;0&quot; width=&quot;1920&quot; height=&quot;1440&quot; webkitallowfullscreen mozallowfullscreen allowfullscreen&gt;&lt;/iframe&gt;</html><height>1440</height><width>1920</width><provider_name>Loom</provider_name><provider_url>https://www.loom.com</provider_url><thumbnail_height>1440</thumbnail_height><thumbnail_width>1920</thumbnail_width><thumbnail_url>https://cdn.loom.com/sessions/thumbnails/700987661c47461190c619e608697768-f3b51980aff6261e.gif</thumbnail_url><duration>164.88</duration><title>Video - Shadow IT</title><description>In this video, I discuss the concept of Shadow IT within FADM and how it can pose security risks by providing unauthorized access to our environment. FADM connects to your hypervisor to gather performance details and traffic data, allowing us to identify underutilized servers that fall into the Shadow IT category. I demonstrate how to access this information through the secure menu and filter servers based on various criteria, including IP addresses and OS support status. I encourage you to review the Shadow IT list and adjust your settings as needed to enhance our security posture. Please remember to save any changes and consider scheduling regular updates for ongoing monitoring.</description></oembed>