To access the Risk Events dashboard, go to Monitoring > Threat Protection.

A screen capture of the Risk Events chart. On the left-hand side are the Filters and Date Range sections. The monitored risk data table is directly below the Risk Events chart.

The drill-down table shows more detailed information about each risk evaluation event, such as IP address and target application.

Scroll to the right to see additional columns. For use of the filtered search bar, see Filtered searching.

Click a column header to sort the results by that value. Results are sorted by the Time column by default, with the most recent entries listed first.