View and Update User Risk Information
The User Risk Management page ( ) uses information from policy violations, anomalies, and malware events to highlight users who might be posting a risk to your data security. This information can help you determine if policies or user permissions need to be adjusted.
You can update the user risk management settings to set risk thresholds and specify the type of information to include in risk assessments.
To modify user risk assessment settings, click the gear icon to the right above the table. Then, change the following settings as needed.
- Under Violation Duration, move the slider to the right or left.
- Under Threshold, move the slider to the right or left.
-
Check or uncheck the types of information (policy violations, malware incidents, anomalies and policy actions) to include in the risk assessment.
Click Save to activate the settings.