Skip to main content

Instructor, no.

Incydr Professional, Enterprise, Horizon, and Gov F2, yes.

Incydr Basic, Advanced, and Gov F1, yes.

HOME
GETTING STARTED
RELEASE NOTES
FAQs
APIs
SYSTEM STATUS
Code42 Support

Risk Exposure dashboard reference

Overview

The Risk Exposure dashboard provides a look into the different types of file activity occurring across your Code42 environment, including employees placed on watchlists and those that have the most critical file activity. Use this dashboard to quickly identify when unusual activity is happening so that you can investigate further. 

This article provides an overview of the Risk Exposure dashboard and links to learn more about each of the major areas. 

Considerations

Differences in file event counts
File events for Forensic Search and Alerts typically appear within 15 minutes of the file activity, while file events in the security event dashboards, All users list, watchlists, and the User Profile may take up to an hour to appear. As a result, you may see that the file event counts in alert notifications and Forensic Search differ from the event counts elsewhere. For more information about how long it takes for events to show up in Incydr, see Expected time ranges for events to appear.

The Risk Exposure dashboard

To view, sign in to the Code42 console. Click the logo in the upper-left or select Dashboards > Risk Exposure to return to the Risk Exposure dashboard at any time. 

Risk Exposure dashboard

Click any of the links below for more information about that corresponding area:

  1. Trust activity: Code42 excludes trusted file activity as defined by your trust settings and any cloud data connections monitored by Code42
  2. Risk settings: Displays all risk indicators and associated scores.
  3. Selected time frame: The time period the file activity occurred in
  4. Organization summary: Shows the number of open alerts, users with critical events, users leaving your company today, and cases details. Click View on any of the tiles to see more information.
  5. Top users by critical activity: List of users with the most critical file activity across your Code42 environment
  6. Watchlists: Groups of users monitored more closely due to potentially higher data risks
  7. Source risk indicator activity: All of the events that occurred across your organization where a file came from a source likely to contain company data
  8. Destination risk indicator activity: All of the file events that occurred across your organization by destination risk indicator
  9. File risk indicator activity: All of the file events that occurred across your organization by file category group
  • Was this article helpful?