To access the OS Distribution chart, go to Monitoring > Threat Protection.

A screen capture of the OS distribution pie chart. The legend is directly above the chart. The Filters and Date Range sections are on the left side of the graph, and the monitored risk data table is below it.

The drill-down table shows more detailed information about each risk evaluation event, such as IP address and target application.

Scroll to the right to see additional columns. For use of the filtered search bar, see Filtered searching.

You can click a column header to sort the results by that value. Results are sorted by the Time column by default, with the most recent entries listed first.