This overview will walk you through the various functionality found on the risks tab.
HIGH-LEVEL INFO:
At the top of the page you will find high level information about the risks in your environment.
Enabled DLPs: By default Cloud Access Monitor has two enabled DLP monitors in place. Managed Methods DLP, and Google DLP. Each one of these DLP's has different filters to catch risks. The specific risks will be labeled in the high level overview box.
TYPES OF RISKS:
In your environment you may find a wide variety of risk types. Risk types can be customized for each environment to ensure you only see the risks that are relevant to you.
Google DLP: Any risks found by googles DLP technology.
Image Risk: Any images that contain risks.
Profanity: Emails, attachments, or files that contain profanity.
PII: Personally Identifiable information, such as a social security number or a drivers license.
PCI: Payment Card Industry risks, such as a credit card number.
RESULTS BOX:
Below the high-level overview you will find the results box. Here all risks found within your environment will be displayed. The results box has six columns with relevant information about each risk.
File: The file or attachment name that contains the risk.
Risk Scanning Method: The DLP that caught the risk, and the risk type associated.
Risk Details: Here you can click the View link to gain insight into the risk found.
Scanned On: The time the risk was found.
Owned By: The owner of the file that contains the risk.
Actions: You can either Quarantine, Download, or Delete the risk.
SEARCHING:
Above the results box is a search box. You can use this box to search for specific risks, based off of a variety of parameters. Selecting the Down Arrow will allow you to fine tune your search.
Name: Search for a specific file or attachment by name.
Owned by: Search for all risks owned by a specific user.
Shared With: Search for all risks that have been shared with a specific user.
Risk Tag: Search for all risks with a specific risk tag, such as PII or PCI.
FILTERING:
Filtering allows you to narrow down the types of risks you would like to be shown.
Risk type: Here you can filter by specific types of risks such as PCI, or PII.
Risk scanned time: This allows you to filter by time periods for risks.
Shared status: Filter by files that have been shared or are not shared.
Files shared: Filter by direction on risks (inbound, outbound, or internal).
Shared via link: Filter by risks that are shared via links.
File Source: Filter by the source of an email (Drive, Teamdrive, Email Attachment, Message Body).
IGNORING RISKS:
Once a risk has been determined as non risky, or the problem as been addressed risks can be ignored to remove them from the risks tab. To ignore a Risk simply select the checkboxes next to the risks that you would like to ignore, and select the ignore button next to the search bar.