This guide will walk you through the process of searching through the risks that were found in your cloud environment.
STEP ONE:
Sign into your Cloud Access Monitor instance.
STEP TWO:
Navigate to the Audit & Control page, and select the Name of your desired Cloud Environment. (Global Views will show all accounts in your domain, while filtered views will show only users for that view)
STEP THREE:
Select the Risks Tab found across the top of the page.
STEP FOUR:
All risks that have been identified in your environment will be displayed in the Enabled Risks section of the page.
STEP FIVE:
To search through the risks in your environment look to the search bar on the left side of the screen.
STEP SIX:
Searches can be be applied by four different parameters.
Name: The name of the file or email that contains the risk.
File Owner Email Sender: The account name that owns the risk.
File Owner Email Receiver: A list of accounts that the risk has been shared with.
Risk Tag: The type of risk that has been discovered, select the type from the search box.
STEP SEVEN:
If you would like to filter for specific risks select the "Filter" button on the right side of the page, Click apply and only the risks you specified will show up.
Filters can include...
Risk Type: The type of risk that triggered.
Risk Scanned Time: The time range in which the risk was found
Shared Status: If the file was shared or not.
File Shared: To an outside domain, from an outside domain, or within your domain.
Shared Via Link: If the file is publicly available by link.
File Source: Drive, Email attachment, Email body, or Team Drive.
STEP EIGHT:
Select Apply, all relevant filtered risks will now be displayed in the results box.