Secure Access Overview

View a graphical summary of how access rules identify activities from your users and devices that may require further investigation.

Important:

This is a “Pre-release” feature and is not considered an official release. Please review the Pre-release Disclaimer before using the feature.

The overview provides an automated view of how well the secure access rules perform, and makes it easy to launch investigations.

The following table outlines the sections available on the screen.

Section

Description

Risk Control Summary

Highlights to Investigate displays the discovered users, devices, and app usage that have triggered risk control rules

  • To check the corresponding rule enforcement details, click View more.

Top 10 Risk Control Rules with Most Discovered Activities displays the risk control rules that have been triggered most often

  • To check the corresponding rule enforcement details, click View more.

For more information, see Secure Access History.

Private Access Control

Displays a summary of Private Access and Internet Access statistics

  • To view activity logs for an entry, click the corresponding block count, access count, or number of detections.

For more information, see Secure Access History.

Internet Access Control