Application Activities
This dashboard displays the following groups of charts:
-
Policy Analytics
-
Activity Monitoring
-
Encryption Statistics
-
Privileged User Activities
Policy Analytics
|
Chart |
What it shows |
|---|---|
|
Files Encrypted by Policy |
The number of files encrypted (for example, files with credit card data) in response to policy violations. This chart provides insights into documents that were encrypted based on one or more policy definitions. |
|
Files Encrypted Over Time |
The number of files that have been encrypted, which indicates encryption trends that can help you better understand the overall risk posture over time. |
|
Policy Hits over Time |
The number of violations or events that the policy engine had detected, indicating trends on the risk posture for your supported cloud applications. |
|
Policy Hits by User |
The number of violations or events detected by the policy engine, by user email address; helps identify top users in violation of compliance policies. |
|
Policy Remediations |
The total number of policy violation actions over a specified period, with a percentage breakdown for each type of action. This view helps identify remediation actions taken for policy violations, which provides insights into adjustments that might be needed to policy remediations. |
|
Activities Over Time |
The number of activities on files, indicating activity trends for your cloud applications. |
|
Policy Hits by Cloud |
The total number of detected policy violations or events for all cloud applications, with a breakdown by cloud. |
|
External Collaborator Hits |
The number of detected policy violations by external collaborators. Helps identify policy violations owing to external collaborators. This is important from the perspective of understanding risk exposure due to external collaborator activities. |
|
Policy Hits |
For each SharePoint site, the number of detected policy violations or events, by type. Applies only to SharePoint sites; shows policy hits by individual site. |
|
Policy Hits by Location |
The number of policy violations or events according to the geographical location where the events occurred. |
|
Public Link Hits Over Time |
For each cloud, the number of public link violations. This view shows compliance violations due to public (open) links. These links could provide access to highly sensitive data which is accessible to anyone with the access to the link. |
|
Advanced Threats and Malwares Over Time |
For each cloud, the number of threats and malware incidents detected. |
|
Key Access Denied over Time |
The number of times that access to a key was denied as defined by key access policies set for your enterprise. |
|
Login Access Denied over Time |
The number of times that login was denied as defined by cloud authentication policies. |
|
Login Access Denied by Location |
A map showing the locations at which login access was denied. |
|
Top 5 Login Access Denied Users |
The highest numbers of login access denials by user. |
Activity Monitoring
|
Chart |
What it shows |
|---|---|
|
Activities Over Time |
The number of activities being performed by users for each cloud, indicating activity trends over time. |
|
Login Activities Over Time |
For each cloud, the number of login activities. |
|
Users by Activity |
Users according to the activities they have performed, providing a view of user activities across cloud applications. |
|
Object Types by Activity |
The types of objects associated with an activity. |
|
Login Activities by OS |
The total number of login activities for a specified period, and a breakdown by percentage for each operating system from which users logged in. This view helps identify activity by OS. |
|
Top 5 Users by File Download |
The total number of files downloaded for a specified period, and a breakdown by percentage for the email addresses of the users with the highest number of downloads. |
|
Downloaded Reports |
The names of reports with the highest number of downloads. |
|
Report Downloads by User |
The email addresses of users who have downloaded the highest number of reports over time. |
|
User Activities by OS |
The number of activities, by cloud, for each operating system to which the users are logged in. |
|
Viewed Reports by User |
The types of reports viewed by users over time. |
|
Account Names by Activity |
The names of the accounts with the highest number of activities over time. |
|
Lead Names by Activity |
The names of the leads with the highest number of activities over time. |
|
Viewed Reports by User |
The highest numbers of reports viewed by users, from highest to lowest. |
|
Shared Content by Activity |
Activities for content that is shared. From this report, you can determine what files are being shared the most (by file name), and what is being done with those files (for example, deleting or downloading). Note In Salesforce cloud applications, sharing activities will show the file ID instead of the file name. |
|
Login Activity by Location |
A circle graph showing counts of login activities by geographical location. |
|
Content Shared by Location |
A circle graph showing counts of content sharing activity by geographical location. |
Encryption Statistics
|
Chart |
What it shows |
|---|---|
|
File Encryption Activities by User |
For each cloud, the email addresses of users with the highest number of file encryptions and decryptions. This view highlights access to highly sensitive encrypted data by users. |
|
Devices Used for File Encryption |
The highest numbers of client devices being used to encrypt and decrypt files. This view highlights access to highly sensitive encrypted data based on devices. |
|
Encryption Activities by File Name |
For each cloud, the names of files with the highest number of encryptions and decryptions. |
|
New Devices Over Time |
For each cloud, the number of new client devices being used for encryption and decryption. |
|
Encryption Activities Over Time |
The number of encryption and decryption activities. |
|
File Decryption by Location |
The geographical locations where files are being decrypted, and the number of files decrypted in each location. Provides important insight into the geo-locations from which highly sensitive encrypted data is being accessed. |
|
Registered Devices by OS |
Shows the total number of client devices registered for use to decrypt files, and a breakdown by percentage for each type of device. |
|
Client Device Registration Failures Over Time |
For each cloud, the number and client device registration failures, month by month. |
|
Decryption Failures Over Time |
For each cloud, shows the number of decryption failures, month by month. |
Privileged User Activities
|
Chart |
What it shows |
|
Privileged Activities Over Time |
The number of privileged-access activities month by month, for each cloud. This view is typically used to identify insider threats by users who have elevated permissions in the cloud applications. |
|
Privileged Activities by Type |
The total number of privileged-access activities, with a percentage breakdown for each activity type. Provides insights into the types of activities being performed by privileged users. |
|
Audit Messages |
For each cloud, the names of the highest number of audit messages are generated. Shows specific security setting changes by privileged users. |
|
Accounts Enabled or Disabled |
The number of accounts frozen and unfrozen by the administrator. Shows user account activation and deactivation events per cloud. |
|
Accounts Created or Deleted |
The number of user accounts created or deleted by an administrator. |
|
Delegated Activities Over Time |
Delegated activities (activities performed by an administrator while logged in as another user). |