Gain insights into access related activities from your at-risk users and devices that may require further investigation.
The following table outlines the available widgets.
Widget
|
Description
|
Highlights to Investigate
|
The discovered users, devices, and app usage that have triggered risk control rules
|
Top 10 Risk Control Rules with Most Discovered Activities
|
The risk control rules that have been triggered most often
|