Unusual accesses
  • 2 minutes to read
  • Dark
    Light
  • PDF

Unusual accesses

  • Dark
    Light
  • PDF

Article summary

In this document, you’ll find detailed information about the Unusual access screen, which displays a report that combines all unusual actions within senhasegura.

Path to access

  1. On senhasegura, in the upper-left corner, click the Grid Menu, represented by the nine squares, and select Behavior.
  2. In the side menu, select Behavior analysis > Unusual access.

Top bar

ItemDescription
Show filtersRepresented by the magnifying glass icon, it displays or hides the search fields on the screen.
UpdateRepresented by the counterclockwise arrow icon, it refreshes the page.
View actionsRepresented by the three vertical dots icon, it displays a drop-down menu with possible actions for the report.
Print reportRepresented by the printer icon, it opens a new page for printing the report.
Export CSVRepresented by the paper sheet icon, it downloads the report.
Schedule reportRepresented by the clock icon, it opens the Schedule report screen.

Search fields

ItemDescription
IDText field that filters sessions by their unique identification code.
OriginText field that filters sessions by the IP address of the user who accessed them.
TargetText field that filters sessions by the target device of the credential used.
CredentialText field that filters sessions by the credential with unusual accesses.
ProtocolText field that filters sessions by the protocol used in unusual accesses.
Access intervalField that filters sessions by the period in which they occurred. Use this field to enter the start date of the period in MM/DD/YYYY format. The downward arrow opens a calendar for date selection.
If the Time field is enabled, use it to enter the start time of the interval.
untilField that filters sessions by the period in which they occurred. Use this field to enter the final date of the period in MM/DD/YYYY format. The downward arrow opens a calendar for date selection.
If the Time field is enabled, use it to enter the end time of the interval.
Origin?Drop-down menu that filters sessions by unusual origin. Available options are Yes and No. Clear the field to enable the All option.
Target?Drop-down menu that filters sessions by unusual destination. Available options are Yes and No. Clear the field to enable the All option.
Credential?Drop-down menu that filters sessions by unusual credential. Available options are Yes and No. Clear the field to enable the All option.
Time?Drop-down menu that filters sessions by unusual time. Available options are Yes and No. Clear the field to enable the All option.
Duration?Drop-down menu that filters sessions by unusual duration. Available options are Yes and No. Clear the field to enable the All option.
RiskText field that filters sessions by risk score.

Report fields

  • Code.
  • Origin.
  • User: personal name of the user who conducted the session.
  • Destination.
  • Credential.
  • Protocol.
  • Start: date and time the session began. Formats: DD/MM/YYYY and HH:MM AM/PM.
  • End: date and time the session ended. Formats: DD/MM/YYYY and HH:MM AM/PM.
  • Duration: duration of the session. Format: HH:MM:SS.
  • Origin?
  • Destination?
  • Credential?
  • Time?
  • Duration?
  • Risk
  • Action: in this column, you access:
    • View details: represented by the magnifying glass icon, it opens the Session logs screen.
    • Video of session: represented by the play icon, opens the Video of session screen.
Info

The report displays 30 records per page. To go to the next screen, click the forward button at the end of the report.


Was this article helpful?