Users
Use the Users dashboard in Risk Monitor to explore different aspects of the users in your organization.
Description
You can, for example, see:
-
The number and percentage of users with access to vulnerable applications.
-
The number of applications each user has access to.
The table lists information about each user, such as organizational unit and the number of vulnerable devices the user has access to.
You can filter the data to focus on a specific subset of the users in your organization. All key figures, charts, and tables will adjust to show the results filtered by the selected parameter. Use the filters to focus on, for example:
-
A specific user.
-
All users within a specific department in your organization.
-
All users with access to a specific application.
-
All users with access to vulnerable applications.
-
All users with access to PII risk applications.
-
All users with access to applications containing a specific vulnerability (CVE ID).
Related use cases
For information on related uses cases, see the following sections:
Characteristics
You can refer to the tables below for descriptions of the key figures, filters, charts, and tables on the dashboard.
Key figures
The key figures give a quick overview of the users and their application access.
Key figure | Description |
---|---|
Inventoried | The total number of users in the organization. |
Vulnerable | The number of users with access to vulnerable applications. |
PII risk | The number of users with access to applications that may contain personally identifiable information. |
Vulnerable PII risk | The number of users with access to applications that are both vulnerable and may contain personally identifiable information. |
Filters
Use one or more filters to focus on specific aspects of the users in your organization. All the key figures, charts, and tables on the page will adjust to show the results filtered by the selected parameter or parameters.
Filter | Description |
---|---|
User | Select a user from the list to see an overview of the user's application access, for example, application types and the number of vulnerable applications. |
Organization | Select an organizational unit from the list to see all users belonging to that organizational unit and an overview of their application access. |
Vulnerable application | Select True to see all users with vulnerable applications installed on their devices. Select False to see all users with no vulnerable applications installed on their devices. |
PII risk | Select True to see all users with PII risk applications installed on their devices. Select False to see all users with no PII risk applications installed on their devices. |
CVE ID | Select a CVE ID from the list to see all users with access to applications containing the vulnerability connected to the CVE ID. |
Application name | Select an application from the list to see all users with access to the application. |
Charts
Use the charts to get insights into different aspects of the users in your organization.
Select a bar in a chart to focus on a specific aspect, for example, all users with access to applications of a specific type. All the key figures, charts, and tables on the page will adjust to show the results filtered by the selected item.
Chart | Description |
---|---|
Installed applications by user | Groups the number of installed applications by user. |
Application types users are accessing | Groups the number of applications by application type. Tip: Filter on a specific user to see the types of applications the user is accessing, for example, e-mail or financial information. |
Vulnerabilities by department/OU | Groups the number of vulnerabilities by department or organizational unit. For each department, the vulnerabilities are divided by base severity category. Tip: Select the critical section of a bar for a specific department to see a list of users in that department with access to applications containing critical vulnerabilities. The list is displayed in the User details table. |
Tables
Use the table to look up details about the users in your organization.
Select a column header to sort the table by that column.
Table | Description |
---|---|
User details | Unfiltered, the table includes all users in the organization. The following details are shown in the table:
|