Overview
The departing employee risk report shows you a summary of risky activity an employee on the Departing watchlist has had in the last 90 days. In the report, you can see a summary of the alerts the user has triggered, the number of cases they were involved in, how many critical events they've caused, and how many events they have that correspond to the most common exfiltration scenarios for departing employees. Use the report to make your offboarding triage tasks more streamlined and consistent.
Considerations
Departing employee risk report
To open the report:
- Go to User Activity > Watchlists.
- Select the Departing watchlist.
- Select a user and click Risk report.
The risk report slides in from the right.
| Item | Description | |
|---|---|---|
| a | Export |
Click to choose to download the risk report as an image (png, jpeg, or svg), or as a CSV file with event details. To export an image of the entire report, click the top area of the report after selecting the image file type. To export only a section of the report, mouse over any item and then click. (The highlighted area indicates the items included in the export.) |
| b | User | |
| c | View profile | Click to see the employee's User profile. |
| d | Notes |
Do one of the following:
Notes are limited to 1000 characters. |
| e | Risk breakdown |
Shows the number of alerts, cases, and Instructor lessons sent to the user in the past 90 days. Click View to see more details about each item. Case and alert counts are only visible if you have the appropriate permissions. Instructor details require a product plan that includes Instructor. |
| f | Risk indicators | Shows the user's top risk indicators sorted by the number of the user's critical events. |
| g | View critical events | Click to see the user's critical events in Forensic Search. |
| h | Common risk scenarios in the last 90 days |
Shows the top risk scenarios for departing employees and the user's file event counts for each scenario.
The same risk scenarios are always shown, and do not change based on the user's file activity. To see the user's most active file activity by risk indicator, see the Risk indicators section of the report. |
Comments
Please sign in to leave a comment.