Seclore Adoption Portal
Seclore Adoption Portal
Protection Analytics
Protection Analytics

Protection Analytics

  • What you need to know
  • Step-by-step
  • Authorized Activities
  • Unauthorized Attempts
  • Related articles

What you need to know

  • In this section, you can explore analytics related to authorized and unauthorized protection activities.
  • You can click on components of the different graphs and create filters to view data in a particular context.
  • These graphs will help you keep track of how protected files/emails are being used and identify anomalies.

Step-by-step

image
image
image
image

You can either go through Authorized Activities or Unauthorized Activities. Click on the type of activities you wish to analyze.

‣

Authorized Activities

‣

Unauthorized Attempts

Related articles

Analyzing and Mitigating RiskAnalyzing and Mitigating RiskIn-depth view of an InsightIn-depth view of an InsightClassification AnalyticsClassification Analytics

Did we miss something? Not to worry! Just email our support team at support@seclore.com

© Seclore Technology Pvt. Ltd. 2026 | Visit our website www.seclore.com