View a graphical summary of how access rules identify activities from your users and devices that may require further investigation.
The overview provides an automated view of how well the secure access rules perform, and makes it easy to launch investigations.
The following table outlines the options available in the screen.
Section |
Description |
---|---|
Risk Control Summary section |
Displays a summary of Risk Control statistics |
Displays a summary of Private Access statistics |
|
Displays a summary of Internet Access statistics |
|
Additional actions |
|