The Secure Access History screen provides detailed logs about user/device access to internal and cloud apps.
The access control logs provide valuable information to analyze the security of your
corporate
devices and resources and to tailor your access control settings.
Tab
|
Description
|
||
User Activity Logs
|
Displays the rule enforcement details by user or device's app or URL access behavior
|
||
Remediation Logs
|
Displays the details about the remediation measures that are performed manually by
the
administrator or automatically through secure access rules
Click a user or device name to view the user or device's current risk status, as well
as
the matched risk control rules, and take an action on the user or device for risk
remediation.
Click the (>) icon to view risk control details.
|