View attack-related risk events that could impact your organization's identity posture.
The following table details the actions available in the Attack tab of
Identity Security Posture.
Action
|
Description
|
See credit usage
|
Hover over Credit usage to see details
about your credit allocation to Cyber Risk Exposure Management.
|
Configure data sources
|
Click Data sources to see and configure
your data sources for Cyber Risk Exposure Management.
|
Export list
|
Click Export to export a CSV file of the
currently listed risk events.
|
View details in Threat and Exposure Management
|
Click any risk event name to view the details of the risk event
in the Threat and Exposure Management app.
|
View details in Attack Risk Event Profile screen
|
Click any details icon (
![]() |