Skip to main content

Identity risks

The Identity risks page displays all the risks caused by the reckless or unintentional actions of active identities, or lack of measures taken to properly secure their working sessions while in your network. It provides detailed info of the level of severity, number of vulnerable identities, risk status and type.

Note

See Identity risk data collection for more details on how we process identity data.

era_identity_risks_937535_en.png
  1. The Smart views panel toggle button. This feature allows you to customize, save, and switch between different loadouts of the Identity risks page.

    era_identity_risks_smart_views937535_en.png

    The panel has the following sections:

    • Search views - Use this search field to filter out the views displayed in the sections below, by name.

    • Saved - This section displays a list of all your saved views that have not been marked as favorites.

    • Favorites - All views marked as favorites are displayed under this section.

    • Defaults - This section displays the views that are available by default:

      • All identity risks

      • High severity

      • Detected

      • Ignored

      • CIS compliant

      • Watchlist

    For any view in the Saved or Favorites category, you can click the vertical ellipses ellipses.PNG to Rename or Delete the view.

  2. The Identity risk actions. This section contains the buttons to all the available actions you can take on the risks displayed on the page:

    • State - Change the state of the selected risks. The following options are available:

      • Ignore risks

      • Restore ignored risks

    • Watchlist - Add or removed the selected risks from your watchlist. The following options are available:

      • Add to watchlist

      • Remove from watchlist

    • Scan - Perform a scan to check for new risks or updates on known risks.

  3. The Filters section. You can use these options to customize the risks that are displayed in the below grid.

    The following filters are currently available:

    Filtering option

    Details

    Identity risk name

    Use the searchable drop-down menu to filter the list of identity risks by name. Select the identity risks you want to display and click Apply.

    Only the selected identity risks are displayed.

    Risk score

    Select a risk score range between 1 and 100.

    Only identity risks with a risk score between these values are displayed.

    Mitigation type

    Use the searchable drop-down menu to filter the list of identity risks by mitigation type. Select the mitigation types you want and click Apply. Possible values:

    • Manual

    • Automatic

    Only identity risks where the types of mitigation you selected applies are displayed.

    Vulnerable identities

    Use the searchable drop-down menu to filter the list of identity risks by the vulnerable identities they affect. Select the identities you want and click Apply.

    Only identity risks that apply to the selected identities are displayed.

    Platform

    Use the searchable drop-down menu to filter the list of identity risks by the platform to which these identity risks apply. Select the operating systems you want and click Apply. Possible values:

    • Unknown

    • IOS

    • Android

    • Windows

    • Linux

    • Solaris

    • Mac OS X

    • Container

    Only identity risks that apply on the selected operating systems are displayed.

    Status

    Use the searchable drop-down menu to filter the list of identity risks by status. Select the statuses you want and click Apply. Possible values:

    • Compliant

    • Detected

    Only identity risks with the statuses you selected are displayed.

    State

    This filter allows you to filter the list of indicators of risk by their status, Active or Ignored.

    Use the searchable drop-down menu to filter the list of identity risks by state. Select the states you want and click Apply. Possible values:

    • Active

    • Ignored

    Only identity risks with the states you selected are displayed.

    Compliance

    Select the Compliance Standard you want to display the identity risks for.

    Only findings resulted from checks based on rules belonging to the Compliance Standards you selected are displayed.

    In watchlist

    Use this filter to display identity risks based on them currently being included in a watchlist. Possible values:

    • Yes

    • No

  4. The View options menu. This section provides you with multiple functions for working with views:

    • Save - Save changes you make to a saved view.

    • Save as - Save a modified view under a different name.

    • Discard changes - Revert the saved view to its original state.

    • Export view - Download the information in a .csv file, which can contain up to 1500 rows.

    • Add to favorites - Add the view to the Favorites category.

    • Show or hide filters - Hide or display the filters menu.

    • Open settings - Display the Settings panel.

      You can use this panel to customize what columns are displayed in the view and enable or disable the Compact view.

  5. The Identity risks grid. The grid displays all known identity risks in your company, based on your last scan.

    The information available for each identity risks displayed under the following columns:

    • Identity risk - The name of the identity risk.

    • Risk score - The risk score of the identity risk. Hovering over the score displays a breakdown of how it was calculated.

    • Vulnerable identities - Displays the number of identities that the identity risk applies to, grouped by type (local or AD).

    • Platform - The type of operating system where the identity risk was detected.

    • Mitigation type - The type of mitigation that can be applied to this identity risk.

    • Status - The status of the identity risk.

    • State - The state of the identity risk.

    • Compliance - The compliance standard(s) corresponding to the check that resulted in the detection of the identity risk.

    • In watchlist - Indicates if the identity risks currently in the watchlist.

    Note

    More details regarding the information in each column are available type in the Filters section.

  6. Actions button - Displays all the actions you can take on each identity risk. Possible values:

    • Ignore risk

    • Add to watchlist