Lookout Product Documentation

Find answers about using and optimizing Lookout products.

Anomalous Downloads, Content Access, and Authentication

The following dashboard charts provide information about anomalous activity across cloud applications.

  • The Anomalous Downloads by Size chart shows a summary count of downloads over time by size of downloaded files.
  • Data hijacking in enterprises is often indicated by an abnormally high number of downloads of business-critical data. For example, when an employee leaves an organization, their activity might reveal that they downloaded a large amount of corporate data just before their departure. This chart tells you the number of times an anomalous pattern is found in user downloads, the users who did the downloading, and when the downloads occurred.
  • The Anomalous Content Delete chart shows the number of delete events for anomalous activity.
  • The Anomalous Authentication chart shows the number of times an anomalous pattern is found in a user’s network access events, including logins, failed or brute-force login attempts, and logouts. Repeated unsuccessful logins could indicate a malicious attempt to gain access to the network.
  • The Anomalous Downloads by Count chart shows the number of anomalous downloads for your enterprise.