Skip to main content

Who is this article for?

Incydr Professional, Enterprise, Gov F2, and Horizon
Incydr Basic, Advanced, and Gov F1

Find your product plan in the Code42 console on the Account menu.
Not an Incydr customer? For CrashPlan articles, search or browse.

Instructor, no.

Incydr Professional, Enterprise, Gov F2, and Horizon, yes.

Incydr Basic, Advanced, and Gov F1, yes.

CrashPlan Cloud, no.

Retired product plans, no.

CrashPlan for Small Business, no.

HOME
GETTING STARTED
RELEASE NOTES
FAQs
APIs
SYSTEM STATUS
Code42 Support

All Users reference

Overview

The All Users list shows all of the users in your Code42 environment sorted on the highest number of critical-severity file events, then by high-severity file events. On this list, you can see the risk indicators associated with a user's file events and see more details about their most recent file activity.

Considerations

  • Add trusted activity and data connections to focus your investigations on higher-risk file activity. Adding trust settings allows Incydr to show only untrusted file events on security event dashboards, user profiles, and alerts, reducing your total file event volume. All file activity is still visible in Forensic Search.

  • To use this functionality, Incydr users must be assigned specific roles. For more information, see Permissions for Incydr

Differences in file event counts
File events for Forensic Search and Alerts typically appear within 15 minutes of the file activity, while file events in the security event dashboards, All users list, watchlists, and the User Profile may take up to an hour to appear. As a result, you may see that the file event counts in alert notifications and Forensic Search differ from the event counts elsewhere. For more information about how long it takes for events to show up in Incydr, see Expected time ranges for events to appear.

All Users list

To access the All Users list:

  1. Sign in to the Code42 console.
  2. Select User Activity > All Users.
    The All Users list appears.

All Users list

Item Description
a Trust settings Trust settings

Indicates trust settings are applied to this page, which filters your view to only show the riskiest activity. Click to learn more and to view your trust settings.


Code42 excludes trusted file activity from appearing on dashboards, watchlists, user profiles, and alerts. Trusted activity is the file activity that occurs on your trusted domains and IP addresses as well as your approved cloud destinations.

b Search Enter a Code42 username to find a specific employee's file activity.
c Risk settings

Click to open Risk settings, from which you can set the score of each risk indicator. Scores are used to calculate the severity of each file event. For more information about Risk settings, see Risk settings reference
 

To edit risk settings, you must have the Insider Risk Admin or Insider Risk Analyst role. Users with the Insider Risk Read Only role can view risk settings, but not make changes.

d Selected time frame  Shows the time frame in which the file activity occurred. Click to change the time frame.
e Quick filters Click View users on any of the filters to only see employees in the list with file events of that severity.
f List of users  Shows all of the users in your Code42 environment sorted by the highest number of critical-severity file events, then by high-severity file events.

List of users

List of all users

Item Description
a User

Shows the name of employee that initiated the file activity, their department*, and title*. 

 

*Department and title are only shown if your Code42 environment uses provisioning.

b Event severities 

Displays file events with the following ranges of risk scores: 

  • Critical severity icon 9+: Critical
  • High severity icon 7-8: High
  • Moderate severity icon 4-6: Moderate
  • Low severity icon 1-3: Low
  • no risk indicates icon 0: No risk indicated

Risk scores are defined for individual risk indicators in Risk settings. For each file event, the score of each applicable risk indicator is added up to an overall risk score. The overall risk score determines the severity of each file event.

c Destination indicators

Risk indicator based on where a file is moved or uploaded.

d File indicators

Risk indicator based on the type of file, as determined by the file extension and file contents.

e User indicators

Risk indicator based on user behavior automatically detected by Incydr and inclusion in high risk user groups, such as departing employees.

—  Departure date / Start date

Lists the dates added when the user was placed on a watchlist. 

  • Departure date: Date the employee is leaving the company (Departing watchlist only)
  • Start date: Date the employee started working at the company (New hire watchlist only)
f Notes Displays any notes added to the User Profile
g Filter

Click to filter the list by:

  • Event severity
  • Departure date or start date (Departing and New hire watchlists only)
  • Risk indicators
  • Username
  • Department (requires provisioning)
  • Watchlists such as contract employees or flight risks. 
h View details View file event details Click to see more details about the user's file activity such as the filename and risk score of their critical and high file events.
i Action menu Action menu

Click to select:

  • View profile: Opens the employee's User Profile where you can view their past file events.
  • View events in search: Opens the employee's file events in Forensic Search where you can see greater detail about the file events.
  • Remove user (available when viewing watchlists): Removes the employee from the watchlist and any associated alerts.

View details

From the list of users, click View event details View details to see more information about a user's file activity. 

View details about a user's file activity

Item Description
a Selected time frame

Shows the time frame the file activity occurred in. Change the time frame in the upper-right corner of the screen. 

b Actions

Do one of the following:

  • Click and select Add to watchlists to add the user to one or more watchlists for closer monitoring.
  • Click and select a custom action.
    • Incydr Flows connect other systems or workflows to Code42. These integrations can add contextual information about users and orchestrate response controls.
    • Custom actions are only available if your organization has worked with Code42 Professional Services to set up Incydr Flows and if you have the correct role.
Visibility of actions
You are only shown actions that you are allowed to access based on your Incydr role and your organization's product plan. For example: 

To add users to watchlists, you must have the Insider Risk Admin role, the Departing Employee Manager role (for the Departing watchlist), or the High Risk Manager role (for all other watchlists). For more information about adding users to watchlists see Manage watchlists.

To access Incydr Flows you must have the Insider Risk Respond role. For more information about Flows, see Introduction to Incydr Flows
c User

Displays a summary of the employee's information, including:

  • Name
  • Department* 
  • Title*
  • Watchlists the employee has been added to

*Displays this information if your Code42 environment uses provisioning. For more information, see Provision user attributes to Code42.

d

View profile View user profile

Opens the User Profile for the employee.
e Notes

Do one of the following:

  • Click Add Click to add notes to add more details to the user's profile.
  • Click Edit Edit user profile notes to modify existing notes.

Notes are limited to 1000 characters.

f Risk indicator events

Displays counts of each file event severity with associated risk indicators.

 

For more information about risk indicators, see Risk settings reference.

g Investigate in Forensic Search Investigate in Forensic Search Click to see more details about the file events in Forensic Search. Learn more about using Forensic Search.
h Filter Click to show filters that allow you to filter the list of events based on risk indicator or watchlist. To remove a selected filter, click it again. 
i By risk score Click to show file events by risk score in descending order.
j By date observed Click to show file events by the date the event occurred with latest events on top.
k View details Click to view details Click to view details about the file event. For detailed descriptions of each field, see File event metadata.
l Filename/Details

Shows filename, risk indicators, risk score, and other details pertaining to the file event.

 

If the filename is shown as a blue hyperlink, you can download the file from this location. If the filename is not a blue hyperlink, you may be able to download the file in Forensic Search.

To view all file events with more detail, click Investigate in Forensic Search Investigate in Forensic Search.

  • Was this article helpful?