Lookout Product Documentation

Find answers about using and optimizing Lookout products.

View and Update User Risk Information

The User Risk Management page (Protect > User Risk Management) uses information from policy violations, anomalies, and malware events to highlight users who might be posting a risk to your data security. This information can help you determine if policies or user permissions need to be adjusted.

You can update the user risk management settings to set risk thresholds and specify the type of information to include in risk assessments.

To modify user risk assessment settings, click the gear icon to the right above the table. Then, change the following settings as needed.

  • Under Violation Duration, move the slider to the right or left.
  • Under Threshold, move the slider to the right or left.
  • Check or uncheck the types of information (policy violations, malware incidents, anomalies and policy actions) to include in the risk assessment.

    Click Save to activate the settings.