Risk Exposure dashboard reference
Overview
The Risk Exposure dashboard provides a look into the different types of file activity occurring across your Code42 environment, including high risk and departing employees as well as employees that have the most file activity. Use this dashboard to quickly identify when unusual activity is happening so that you can investigate further.
This article provides an overview of the Risk Exposure dashboard and links to learn more about each of the major areas.
Considerations
-
To work with the Risk Exposure dashboard, you must have roles that provide the necessary permissions. We recommend you use the roles in our use case for adding users to detection lists.
- Feature visibility:
-
The risk detection list summaries require a product plan that includes Risk Detection lenses.
- Contact your Customer Success Manager (CSM) for assistance with licensing. If you don't know who your CSM is, email csmsupport@code42.com.
The Risk Exposure dashboard
To view, sign in to the Code42 console.
Click one of the links below for more information about that corresponding area:
- Risk detection list summaries - how many of the employees that are on a risk detection list have recently had possible exfiltration events
- Top users by file activity - list of users with the most file activity across your Code42 environment
- All activity view - all of the file events that occurred across your organization
- Endpoint activity over time - all of the file events that have occurred on an endpoint across your organization for up to the last 90 days
- Cloud sharing activity over time - shows when files are made publicly available across your organization for up to the last 90 days
Video
Watch the video below to learn about the Risk Exposure dashboard. For more videos, visit the Code42 University.