This widget displays information about the top sensitive files that triggered Data
               Discovery policy violations over time.
|  | NoteBy default, the widget displays data from all the managed products
                              that a user account has privileges to view. | 
Use the Range drop-down to select the time period
               for the data that displays.
- 
To specify a custom time range or time interval, click the settings icon () and select Customized for the Range.
Use the Rule drop-down to specify the rule
               that triggered the detection.
- 
To specify the number of detections that display, click the settings icon () and select from the Sensitive files to display drop-down.
- 
To aggregate the remaining data, click the settings icon () and select Display the remaining data as "Others".
You can choose to display the data in a table, bar
               chart, or pie chart by clicking the display icons (

 ).
). 


 ).
). The default view displays the following information in a
               table.
| Column Name | Description | 
| File | Displays the sensitive files potentially leaked | 
| Detections | Displays the number of times that the sensitive file has been potentially
                              leaked Click the Detections column name to sort the table by
                              the number of detections. | 
| Percentage | Displays the number of times that the sensitive file has been potentially
                              leaked as a percentage of the total number of detections | 
Click a number in the Detections column
               or click a chart section to view detailed information.
| Data | Description | 
| Received | The time and date Apex Central received the data | 
| Generated | The time and date the detection occurred | 
| Rule | The rule that is triggered | 
| Endpoint | The endpoint that triggered the rule | 
| Domain | The domain that triggered the rule | 
| User | The user that triggered the rule  | 
| User Domain | The domain that the user belongs to | 
| File Path | The file path for the sensitive file | 
| File | The name of the sensitive file | 
| Template | The template that the rule belongs to | 
| Action |  The action taken on the sensitive file | 
 
		
 →
 → 