Exfiltration dashboard reference

Overview

The Exfiltration dashboard provides insight into file movement across your environment, enabling you to quickly identify files moving to untrusted destinations.

Considerations

  • Add trusted activity and data connections to focus your investigations on higher-risk file activity. Adding trust settings allows Incydr to show only untrusted file events on security event dashboards, user profiles, and alerts, reducing your total file event volume. All file activity is still visible in Forensic Search.
  • To use this functionality, Incydr users must be assigned specific roles. For more information, see Permissions for Incydr.
  • Visibility of Incydr data is not limited by your Incydr organization hierarchy. Users with roles that allow access to Incydr features can view insider risk data for users in all organizations.

The Exfiltration dashboard

To view the Exfiltration dashboard:

  1. Sign in to the Incydr console.
  2. Select Dashboards > Exfiltration

Exfiltration_Dashboard-2024-03-22-source.png

Click any of the links below for more information about that corresponding area:

Differences in file event counts
File events may appear in Forensic Search before they appear in dashboards, alerts, watchlists, the All Users list, and User Profiles. As a result, you may see that the file event counts in Forensic Search differ from the event counts elsewhere. For more details, see Expected time ranges for events to appear.

Related topics

Was this article helpful?
0 out of 0 found this helpful

Comments

0 comments

Please sign in to leave a comment.