View a graphical summary of how access rules identify activities from your users and devices that may require further investigation.

The overview provides an automated view of how well the secure access rules perform, and makes it easy to launch investigations.
The following table outlines the options available in the screen.
Displays a summary of Risk Control statistics
Displays a summary of Private Access statistics
Displays a summary of Internet Access statistics
Additional actions