Application Activities

This dashboard displays the following groups of charts:

  • Policy Analytics

  • Activity Monitoring

  • Encryption Statistics

  • Privileged User Activities

Policy Analytics

Chart

What it shows

Files Encrypted by Policy

The number of files encrypted (for example, files with credit card data) in response to policy violations. This chart provides insights into documents that were encrypted based on one or more policy definitions.

Files Encrypted Over Time

The number of files that have been encrypted, which indicates encryption trends that can help you better understand the overall risk posture over time.

Policy Hits over Time

The number of violations or events that the policy engine had detected, indicating trends on the risk posture for your supported cloud applications.

Policy Hits by User

The number of violations or events detected by the policy engine, by user email address; helps identify top users in violation of compliance policies.

Policy Remediations

The total number of policy violation actions over a specified period, with a percentage breakdown for each type of action. This view helps identify remediation actions taken for policy violations, which provides insights into adjustments that might be needed to policy remediations.

Activities Over Time

The number of activities on files, indicating activity trends for your cloud applications.

Policy Hits by Cloud

The total number of detected policy violations or events for all cloud applications, with a breakdown by cloud.

External Collaborator Hits
by Cloud

The number of detected policy violations by external collaborators. Helps identify policy violations owing to external collaborators. This is important from the perspective of understanding risk exposure due to external collaborator activities.

Policy Hits
by SharePoint Site

For each SharePoint site, the number of detected policy violations or events, by type. Applies only to SharePoint sites; shows policy hits by individual site.

Policy Hits by Location

The number of policy violations or events according to the geographical location where the events occurred.

Public Link Hits Over Time

For each cloud, the number of public link violations. This view shows compliance violations due to public (open) links. These links could provide access to highly sensitive data which is accessible to anyone with the access to the link.

Advanced Threats and Malwares Over Time

For each cloud, the number of threats and malware incidents detected.

Key Access Denied over Time

The number of times that access to a key was denied as defined by key access policies set for your enterprise.

Login Access Denied over Time

The number of times that login was denied as defined by cloud authentication policies.

Login Access Denied by Location

A map showing the locations at which login access was denied.

Top 5 Login Access Denied Users

The highest numbers of login access denials by user.

 

Activity Monitoring

Chart

What it shows

Activities Over Time

The number of activities being performed by users for each cloud, indicating activity trends over time.

Login Activities Over Time

For each cloud, the number of login activities.

Users by Activity

Users according to the activities they have performed, providing a view of user activities across cloud applications.

Object Types by Activity
(Salesforce cloud applications)

The types of objects associated with an activity.

Login Activities by OS

The total number of login activities for a specified period, and a breakdown by percentage for each operating system from which users logged in. This view helps identify activity by OS.

Top 5 Users by File Download

The total number of files downloaded for a specified period, and a breakdown by percentage for the email addresses of the users with the highest number of downloads.

Downloaded Reports

The names of reports with the highest number of downloads.

Report Downloads by User

The email addresses of users who have downloaded the highest number of reports over time.

User Activities by OS

The number of activities, by cloud, for each operating system to which the users are logged in.

Viewed Reports by User

The types of reports viewed by users over time.

Account Names by Activity
(Salesforce cloud applications only)

The names of the accounts with the highest number of activities over time.

Lead Names by Activity
(Salesforce cloud applications only)

The names of the leads with the highest number of activities over time.

Viewed Reports by User

The highest numbers of reports viewed by users, from highest to lowest.

Shared Content by Activity

Activities for content that is shared. From this report, you can determine what files are being shared the most (by file name), and what is being done with those files (for example, deleting or downloading).

Note

In Salesforce cloud applications, sharing activities will show the file ID instead of the file name.

Login Activity by Location

A circle graph showing counts of login activities by geographical location.

Content Shared by Location

A circle graph showing counts of content sharing activity by geographical location.

Encryption Statistics

Chart

What it shows

File Encryption Activities by User

For each cloud, the email addresses of users with the highest number of file encryptions and decryptions. This view highlights access to highly sensitive encrypted data by users.

Devices Used for File Encryption

The highest numbers of client devices being used to encrypt and decrypt files. This view highlights access to highly sensitive encrypted data based on devices.

Encryption Activities by File Name

For each cloud, the names of files with the highest number of encryptions and decryptions.

New Devices Over Time

For each cloud, the number of new client devices being used for encryption and decryption.

Encryption Activities Over Time

The number of encryption and decryption activities.

File Decryption by Location

The geographical locations where files are being decrypted, and the number of files decrypted in each location. Provides important insight into the geo-locations from which highly sensitive encrypted data is being accessed.

Registered Devices by OS

Shows the total number of client devices registered for use to decrypt files, and a breakdown by percentage for each type of device.

Client Device Registration Failures Over Time

For each cloud, the number and client device registration failures, month by month.

Decryption Failures Over Time

For each cloud, shows the number of decryption failures, month by month.

 

Privileged User Activities

Chart

What it shows

Privileged Activities Over Time

The number of privileged-access activities month by month, for each cloud. This view is typically used to identify insider threats by users who have elevated permissions in the cloud applications.

Privileged Activities by Type

The total number of privileged-access activities, with a percentage breakdown for each activity type. Provides insights into the types of activities being performed by privileged users.

Audit Messages

For each cloud, the names of the highest number of audit messages are generated. Shows specific security setting changes by privileged users.

Accounts Enabled or Disabled
Over Time

The number of accounts frozen and unfrozen by the administrator. Shows user account activation and deactivation events per cloud.

Accounts Created or Deleted
Over Time

The number of user accounts created or deleted by an administrator.

Delegated Activities Over Time

Delegated activities (activities performed by an administrator while logged in as another user).