With tags or filters, you can:
View a list of users and actionable information such as associated security threats, policy status, and contact information per user
View a list of endpoints and policy status per endpoint
View a timeline chart for incident investigation
The User Access Information in an ad hoc query (see Understanding Ad Hoc Queries) provides details about any user modifications related to any available custom tags or filters.