© Seclore Technology Pvt. Ltd. 2026 | Visit our website www.seclore.com

Seclore Adoption Portal
Seclore Adoption Portal
/Help center
Help center
/Risk and Analytics Dashboard
Risk and Analytics Dashboard
/Protection Analytics
Protection Analytics
Protection Analytics
Protection Analytics

Protection Analytics

  • What you need to know
  • Step-by-step
  • Authorized Activities
  • Unauthorized Attempts
  • Related articles

What you need to know

  • In this section, you can explore analytics related to authorized and unauthorized protection activities.
  • You can click on components of the different graphs and create filters to view data in a particular context.
  • These graphs will help you keep track of how protected files/emails are being used and identify anomalies.

Step-by-step

image
image
image
image

You can either go through Authorized Activities or Unauthorized Activities. Click on the type of activities you wish to analyze.

‣

Authorized Activities

In the Authorized Activities section, you'll get useful charts and graphs related to Open, Print, Protect, and Unprotect activities performed by authorized users on protected files/emails.

image
💡
Note that selecting 'Last Week' would show data from Sunday to Saturday in the previous week.
image
image
image
image
image
image

This data will help you understand how well Seclore's IRM capabilities are being used in your organization.

image

The next graph helps you understand which domains are performing most of the authorized activities.

image

If you see too many activities done by one external domain, it could prompt you check whether there was a valid business need for it. Similarly, you can use this graph to identify other anomalies.

💡
Domain used by users from your organization are considered internal domain, whereas any other domain is considered external.
image

Next, there's a pie chart with slices that represent the percentage of authorized activities done on classified files/emails with different classification labels.

image
💡
If you see too many activities done on files/emails with high sensitivity labels, it could prompt you to investigate if activities are being done with a malicious intent.
image
image
💡
A sudden spike in a week/month could prompt you to check events that happened during that time.
image

Finally, if you're an organization with offices across the globe, this heat map can be very useful for you.

image

Filter view

  • You can use filters to view the graphs in a particular context.
  • Clicking on a chart component adds that component as a filter.
  • Here's how a filtered view would look.
image
image
image
‣

Unauthorized Attempts

In the Unauthorized Attempts section, you'll get useful charts and graphs related to Open, Print, and Unprotect activities attempted by unauthorized users on protected files/emails.

image
💡
Note that selecting 'Last Week' would show data from Sunday to Saturday in the previous week.
image
image
image
image
image
image

Too many unauthorized activity attempts could prompt you to investigate if files/emails are being shared with unauthorized users with malicious intent.

image

The next graph helps you understand which domains are attempting most of the unauthorized activities.

image

Too many unauthorized attempts done by users of one external domain could mean that protected files/emails may have been shared with those users with malicious intent (although these attempts were blocked by Seclore). Similarly, you can use this graph to identify other anomalies.

💡
Domain used by users from your organization are considered internal domain, whereas any other domain is considered external.
image

Next, there's a pie chart with slices that represent the percentage of unauthorized activities attempted on classified files/emails with different classification labels.

image
💡
If you see too many activities done on files/emails with high sensitivity labels, it could prompt you to investigate if activities are being done with a malicious intent.
image
image
💡
A sudden spike in a week/month could prompt you to check events that happened during that time - perhaps you ended your partnership with a vendor but they still have your files.
image

Finally, if you're an organization with offices across the globe, this heat map can be very useful for you.

image
💡
The heat map could prompt you to contact the regional heads and let them know about the volume of unauthorized activities in their region.

Filter view

  • You can use filters to view the graphs in a particular context.
  • Clicking on a chart component adds that component as a filter.
  • Here's how a filtered view would look.
image
image

Related articles

Analyzing and Mitigating RiskAnalyzing and Mitigating RiskIn-depth view of an InsightIn-depth view of an InsightClassification AnalyticsClassification Analytics

Did we miss something? Not to worry! Just email our support team at support@seclore.com