View reports
Before you begin
For a more granular view, access the data security reports.
Steps
Report | Description |
---|---|
Content Type | |
Compliance Summary | Details the compliance rules are most often violated in your organization, and provides a breakdown of the incident count for each policy or rule. |
Custom Classifier Summary | Shows which custom classifiers triggered the most incidents during the designated period. |
Data Theft Summary | A list of data theft classifiers that triggered the most incidents during the designated period. |
Incidents | |
Incident List | A list or chart of all data loss incidents that were detected during the designated period, along with incident details such as the destination, severity, and transaction size. |
Sources & Destinations | |
Destination Summary | The destination URLs or IP addresses involved with the most violations, broken down by severity. |
Users Summary | The users, machines, or IP addresses most frequently violating data security policies and the severity of their breaches. |