Data Security reports
Note that data returned from Data Protection Service to the cloud proxy does not support all of the fields included in Data Security reports. Use Forcepoint DLP to view and report on incidents not included in the these reports. See Viewing Incidents and Reports for more information.
Report | Description |
---|---|
Content Type | |
Compliance Summary | Which compliance rules are most often violated in your organization and view a breakdown of the incident count for each policy or rule. |
Custom Classifier Summary | Which custom classifiers triggered the most incidents during the designated period. |
Data Theft Summary | A list of all data theft incidents that were detected during the designated period, along with incident details. |
Incidents | |
Incident List | List or chart of all data loss incidents that were detected during the designated period, along with incident details such as the destination, severity, and transaction size. |
Sources and Destinations | |
Destination Summary | Destination URLs or IP addresses involved with the most violations, broken down by severity. |
Users Summary | Users, machines, or IP addresses most frequently violating data security policies and the severity of their breaches. |