Gain insights into access related activities from your at-risk users and devices that may require further investigation.
The following table outlines the available widgets.
| Widget | Description | 
| Highlights to Investigate | The discovered users, devices, and app usage that have triggered risk control rules 
 | 
| Top 10 Risk Control Rules with Most Discovered Activities | The risk control rules that have been triggered most often 
 | 
 
		