You can use the High Risk Models chart to see which risk factors are most prevalent.

To access the High Risk Models chart, go to Monitoring > Threat Protection.

A screen capture of the Risk Models page showing a bar graph of the high risk model distribution over the past week.

The drill-down table shows more detailed information about each risk evaluation event, including user, IP address, and target application.

Scroll to the right to see additional columns. For use of the filtered search bar, see Filtered searching.

You can click a column header to sort the results by that value. Results are sorted by the Time column by default, with the most recent entries listed first.