View a graphical summary of how access rules identify activities from your users and devices that may require further investigation.
This is a “Pre-release” feature and is not considered an official release. Please review the Pre-release Disclaimer before using the feature.
The overview provides an automated view of how well the secure access rules perform, and makes it easy to launch investigations.
The following table outlines the sections available on the screen.
Section |
Description |
---|---|
Risk Control Summary |
Highlights to Investigate displays the discovered users, devices, and app usage that have triggered risk control rules
Top 10 Risk Control Rules with Most Discovered Activities displays the risk control rules that have been triggered most often
For more information, see Secure Access History. |
Private Access Control |
Displays a summary of Private Access and Internet Access statistics
|
Internet Access Control |