What you need to know
- In this section, you can explore analytics related to authorized and unauthorized protection activities.
- You can click on components of the different graphs and create filters to view data in a particular context.
- These graphs will help you keep track of how protected files/emails are being used and identify anomalies.
Step-by-step
You can either go through Authorized Activities or Unauthorized Activities. Click on the type of activities you wish to analyze.
‣
Authorized Activities
‣
Unauthorized Attempts
Related articles
Analyzing and Mitigating RiskIn-depth view of an InsightClassification AnalyticsDid we miss something? Not to worry! Just email our support team at support@seclore.com