Accesses by unusual origin
- 1 minute to read
- Print
- DarkLight
- PDF
Accesses by unusual origin
- 1 minute to read
- Print
- DarkLight
- PDF
Article summary
Did you find this summary helpful?
Thank you for your feedback
In this document, you’ll find detailed information about the Accesses by unusual origin screen, which displays a report with details on user sessions initiated from source IPs different from those usually associated with the user.
Path to access
- On senhasegura, in the upper-left corner, click the Grid Menu, represented by the nine squares, and select Behavior.
- In the side menu, select Behavior analysis > Accesses by unusual origin.
Top bar
Item | Description |
---|---|
Show filters | Represented by the magnifying glass icon, it displays or hides the search fields on the screen. |
Update | Represented by the counterclockwise arrow icon, it refreshes the page. |
View actions | Represented by the three vertical dots icon, it displays a drop-down menu with possible actions for the report. |
Print report | Represented by the printer icon, it opens a new page for printing the report. |
Export CSV | Represented by the paper sheet icon, it downloads the report. |
Schedule report | Represented by the clock icon, it opens the Schedule report screen. |
Search fields
Item | Description |
---|---|
Origin | Text field that filters sessions by the IP address of the user who made the access. |
User | Text field that filters sessions by the senhasegura username who made the access. |
Sessions interval | Text field that filters by the number of sessions to be investigated. Use this field to enter the starting number of the range you wish to investigate. |
until | Text field that filters by the number of sessions to be investigated. Use this field to enter the ending number of the range you wish to investigate. |
Risk range | Text field that filters by the session score range. Use this field to enter the starting number of the range you wish to investigate. |
until | Text field that filters by the session score range. Use this field to enter the ending number of the range you wish to investigate. |
Report fields
- Target.
- Credential.
- Protocol.
- Access.
- Action: in this column, you can access:
- Unusual accesses: represented by the magnifying glass icon, it opens the Unusual accesses which can also be accessed through the path Grid Menu > Behavior > Behavior analysis > Unusual accesses.
Info
The report displays 30 records per page. To go to the next screen, click the forward button at the end of the report.
Was this article helpful?