Gain insights into access related activities from your at-risk users and devices that may require further investigation.
The following table outlines the available widgets.
Widget |
Description |
---|---|
Highlights to Investigate |
The discovered users, devices, and app usage that have triggered risk control rules
|
Top 10 Risk Control Rules with Most Discovered Activities |
The risk control rules that have been triggered most often
|