Skip to main content

Users

Use the Users dashboard in Risk Monitor to explore different aspects of the users in your organization.

Description

You can, for example, see:

  • The number and percentage of users with access to vulnerable applications.

  • The number of applications each user has access to.

The table lists information about each user, such as organizational unit and the number of vulnerable devices the user has access to.

You can filter the data to focus on a specific subset of the users in your organization. All key figures, charts, and tables will adjust to show the results filtered by the selected parameter. Use the filters to focus on, for example:

  • A specific user.

  • All users within a specific department in your organization.

  • All users with access to a specific application.

  • All users with access to vulnerable applications.

  • All users with access to PII risk applications.

  • All users with access to applications containing a specific vulnerability (CVE ID).

For information on related uses cases, see the following sections:

Characteristics

You can refer to the tables below for descriptions of the key figures, filters, charts, and tables on the dashboard.

Key figures

The key figures give a quick overview of the users and their application access.

Key figureDescription
InventoriedThe total number of users in the organization.
VulnerableThe number of users with access to vulnerable applications.
PII riskThe number of users with access to applications that may contain personally identifiable information.
Vulnerable PII riskThe number of users with access to applications that are both vulnerable and may contain personally identifiable information.

Filters

Use one or more filters to focus on specific aspects of the users in your organization. All the key figures, charts, and tables on the page will adjust to show the results filtered by the selected parameter or parameters.

FilterDescription
UserSelect a user from the list to see an overview of the user's application access, for example, application types and the number of vulnerable applications.
OrganizationSelect an organizational unit from the list to see all users belonging to that organizational unit and an overview of their application access.
Vulnerable applicationSelect True to see all users with vulnerable applications installed on their devices.
Select False to see all users with no vulnerable applications installed on their devices.
PII riskSelect True to see all users with PII risk applications installed on their devices.
Select False to see all users with no PII risk applications installed on their devices.
CVE IDSelect a CVE ID from the list to see all users with access to applications containing the vulnerability connected to the CVE ID.
Application nameSelect an application from the list to see all users with access to the application.

Charts

Use the charts to get insights into different aspects of the users in your organization.

Select a bar in a chart to focus on a specific aspect, for example, all users with access to applications of a specific type. All the key figures, charts, and tables on the page will adjust to show the results filtered by the selected item.

ChartDescription
Installed applications by userGroups the number of installed applications by user.
Application types users are accessingGroups the number of applications by application type.
Tip: Filter on a specific user to see the types of applications the user is accessing, for example, e-mail or financial information.
Vulnerabilities by department/OUGroups the number of vulnerabilities by department or organizational unit. For each department, the vulnerabilities are divided by base severity category.
Tip: Select the critical section of a bar for a specific department to see a list of users in that department with access to applications containing critical vulnerabilities. The list is displayed in the User details table.

Tables

Use the table to look up details about the users in your organization.

Select a column header to sort the table by that column.

TableDescription
User detailsUnfiltered, the table includes all users in the organization.
The following details are shown in the table:
  • User: The name of the user.
  • Department/OU: The department or organizational unit the user belongs to.
  • Last logged on: The date on which the user last logged on to a device.
  • Installed applications: The number of applications the user has access to.
  • PII risk applications: The number of PII risk applications the user has access to.
  • Vulnerable applications: The number of vulnerable applications the user has access to.
  • Vulnerable PII risk applications: The number of vulnerable PII risk applications the user has access to.
  • PII risk devices: The number of PII risk devices the user has access to.
  • Vulnerable devices: The number of vulnerable devices the user has access to.
  • Vulnerable PII risk devices: The number of vulnerable PII risk devices the user has access to.