View a graphical summary of how access rules identify activities from your users and devices that may require further investigation.
The overview provides an automated view of how well the secure access rules perform,
and
makes it easy to launch investigations.
The following table outlines the options available in the screen.
Section
|
Description
|
Risk
Control Summary section
|
Displays a summary of Risk Control statistics
|
Displays a summary of AI Service Access statistics
|
|
Private Access tab
|
Displays a summary of Private Access statistics
|
Internet Access tab
|
Displays a summary of Internet Access statistics
|
Additional actions
|
|