Nightfall Documentation
  • Data Detection and Response
  • Posture Management
  • Data Exfiltration Prevention
  • Data Encryption
  • Developer APIs
  • Data Classification and Discovery
  • Welcome to Nightfall Documentation
  • Release Notes
    • Release Notes 2025
    • Release Notes 2021-2024
  • Introduction
    • Why Cloud DLP?
    • Introduction to Nightfall
    • Nightfall Overview
    • Cloud-native DLP vs. CASB
    • How Nightfall Works
    • Reasons to Choose Nightfall
    • Benefits of Nightfall
  • Compliance
    • How Nightfall Fits into Compliance Frameworks
    • ISO 27001 Compliance + DLP
    • SOC 2 Compliance + DLP
    • PCI Compliance + DLP
    • PHI Detector - More on Nightfall's HIPAA Compliance Detector
  • Getting Started
    • Installing Nightfall
  • Nightfall Detection Platform
    • Overview
    • Detectors
    • Choosing a Nightfall Detector
      • Compliance Use Cases
      • Data Protection Use Cases
    • Nightfall Detector Glossary
      • Secrets Detection
    • Creating Custom Detectors
      • Creating Dictionary Detector
      • Create File Type Detector
      • Create File Fingerprint Detector
      • Create Regular Expression Detector
      • Extend a Nightfall Detector
    • Create Detection Rules
    • Detection Platform Overview
    • Evaluating Detection
    • Creating Policies
      • Selecting Integration
      • Scope of the Policy
      • Detection Rules
      • Advanced Settings
      • Name and Risk Score
    • Historical Scan Detection Rules
    • Regex Library
    • Detection Platform FAQs
      • How can I reduce false positives in my findings?
      • What do different “Confidence Levels” mean?
      • What file types will Nightfall scan for sensitive data? What are the limitations?
      • How do I use Context Rules?
      • How do I use Exclusion Rules?
      • Does Nightfall have a regex library I can choose from?
      • Why does Nightfall sometimes miss to report SSN, credit card number, and so on?
      • Why does the Password Detector Report False Positive Zoom Password Findings?
  • Nightfall Detection & Policy Templates
    • Detection Rules
    • Nightfall Sample Data Sets
  • Dashboard and Events
    • Nightfall Dashboard
    • Data Detection and Response Events
      • Filtering Events
      • Event Filter Operators
      • Applying Actions on Events
      • Applying Bulk Actions on Events
      • Event Status
      • Deduplication and Automatic Resolution of Events
  • Setting up Alert Platforms
    • Nightfall Alert Platforms
    • Setting up Slack as an Alert Platform
    • Setting up Jira as an Alert Platform
    • Setting up MS Teams as an Alert Platform
  • Operationalizing Nightfall DLP
    • Playbook
    • Informing & Coaching Business Users
    • Alert Management Guiding Principles
    • Integrating with Security Tools
      • Integrating with SIEM
        • Integrating with Microsoft Sentinel
      • Creating Dashboards for Nightfall Alerts in Splunk
      • Creating Dashboards for Nightfall Alerts in Sumo Logic
      • Sending Alerts to Microsoft Teams
    • Frequently Asked Questions (FAQs) for End-Users
  • Nightfall Integrations
  • Nightfall for Slack
    • Nightfall for Slack: Quick Start
    • Getting Started With Nightfall for Slack
      • Requirements
        • Requirements for Nightfall DLP for Slack Enterprise
        • Requirements for Nightfall DLP for Slack Pro and Slack Business+
      • Installing Nightfall for Slack
        • Installing Nightfall DLP for Slack Enterprise
        • Installing Nightfall DLP for Slack Pro and Business+
    • Configure Alerts for Slack
    • Configuring Policies for Slack Pro and the Slack Business+ Editions
      • Slack Pro and Business+ App Selection
      • Configure Scope for Slack Pro and Slack Business+
      • Configure Detection Rules for Slack Pro and Slack Business+
      • Configure Automated Actions in Slack Pro and Slack Business+
      • Configure Advanced Settings in Slack Pro and Slack Business+
      • Risk Configuration in Slack DLP for Slack Pro and Slack Business+ Editions
      • Manage Events for Slack
    • Configuring Policies for the Slack Enterprise Edition
      • Slack App Selection
      • Configure Scope for Slack Enterprise
      • Select Detection Rules for Slack Enterprise
      • Configure Automated Actions in Slack Enterprise
      • Configure Advanced Settings for Slack Enterprise
      • Risk Configuration for Slack Enterprise
      • Manage Events for Slack Enterprise
    • FAQs
      • Can I redact sensitive message content in Slack?
      • Nightfall for Slack Pro vs Enterprise
        • Upgrading from Slack Pro to Enterprise
      • Can we customize the alert messages sent in Slack?
      • Can I Disable Detection in Private Channels or DMs?
      • What types of channels does Nightfall scan? Does Nightfall scan shared channels?
      • I am unable to view a sensitive message or file from the Nightfall alert channel.
      • Upon Slack installation, why am I seeing a 400 error mentioning a "Restricted Action"?
      • I send a sensitive message, edit it, and then admin applies the Redact action. What is the outcome?
      • How do I re-install Nightfall DLP for Slack Pro Edition?
      • How do I re-install Nightfall DLP for Slack Enterprise Edition?
  • Nightfall for GitHub
    • Getting Started
      • Requirements
      • Install Nightfall for GitHub
      • Configure Alerts for GitHub
    • Configure Policies for GitHub
      • GitHub App Selection
      • Configure Scope for GitHub
        • Use Regular Expressions to Exclude GitHub Directories
      • Configure Detection Rules for GitHub
      • Configure Advanced Settings for GitHub
      • Configure Risk Score for GitHub
    • Manage GitHub Events
    • Remediation on Nightfall for Github
  • NIGHTFALL FOR GOOGLE DRIVE
    • Getting Started
      • Requirements
      • Install Nightfall for Google Drive
      • Enable Google Drive Labels
      • Configure Alerts for Google Drive
    • Configure Policies for Google Drive
      • Google Drive App Selection
      • Configure Scope for Google Drive
      • Configure Detection Rules for Google Drive
      • Configure Advanced Settings for Google Drive
      • Risk Score for Google Drive
      • Manage Google Drive Events
  • Nightfall for Confluence
    • Getting Started
    • Install Nightfall for Confluence
      • Configure Alerts for Confluence
    • Configuring Policies for Confluence
      • Confluence App Selection
      • Configure Scope for Confluence
      • Configure Detection Rules for Confluence
      • Configure Advanced Settings for Confluence
      • Configure Risk Score for Confluence
      • Manage Confluence Events
    • FAQs
      • Page Restrictions
  • Nightfall for jira
    • Getting Started
    • Install Nightfall for Jira
      • Configuring Alerts for Jira
    • Configure Policies in Nightfall for Jira
      • Jira App Selection
      • Configure Scope in Nightfall for JIRA
      • Select Detection Rules in Nightfall for JIRA
      • Configuring Advanced Settings in Nightfall for JIRA
      • Configure Risk Score for Jira
      • Manage Jira Events
  • Nightfall for Microsoft 365
    • Getting Started
      • Microsoft 365 Requirements
      • Setting up Directory Sync
      • Setting up Microsoft Tenant
        • Update App Selection for a Registered Tenant
    • Nightfall for OneDrive
      • Configure Alerts for OneDrive
      • Nightfall Policies for OneDrive
        • OneDrive App Selection
        • Configure Scope for OneDrive
        • Configure Detection Rules for OneDrive
        • Configure Advanced Settings for OneDrive
        • Risk Score for OneDrive Policies
        • Manage OneDrive Events
    • Nightfall for Microsoft Teams
      • Configure Alerts for Microsoft Teams
      • Configure Policies for Microsoft Teams
        • Select Integration in Microsoft Teams
        • Configure Scope for Microsoft teams
          • Scope for Personal Chats
          • Scope for MS Teams Channels
        • Configure Detection Rules in Microsoft Teams DLP
        • Configure Advanced Settings in Microsoft Teams
        • Risk Score in Microsoft Teams Policies
        • Manage Microsoft Teams Events
  • Nightfall for Microsoft Exchange Online
    • Getting Started
      • Microsoft Exchange Requirements
      • Setting up Directory Sync
      • Installing Microsoft Exchange
        • Create Connectors
        • Create Rules
        • Create MX Record
    • Nightfall for Microsoft Exchange
      • Configure Alerts for Exchange
      • Configure Policies for Exchange
        • Select Integration in Exchange
        • Configure Scope for Exchange
        • Configure Detection Rules in Exchange
        • Configure Advanced Settings in Exchange
        • Risk Score in Exchange
        • Manage Exchange Events
  • Nightfall for Gmail
    • Overview
    • Install Nightfall DLP for Gmail
      • Configure Content Compliance Rules
        • Create Content Compliance Rule - Monitoring
        • Configure Content Compliance Rule - Quarantine
        • Configure Routing Rules - SMTP Relay Settings
    • Configure Alerts for Gmail
    • Nightfall Policies for Gmail
      • Gmail App Selection
      • Configure Scope for Gmail
      • Configure Detection Rules for Gmail
      • Configure Advanced Settings for Gmail
      • Configure Risk Score for Gmail
      • Manage Gmail Events
    • Remediation on Nightfall for Gmail
  • Nightfall For Salesforce
    • Overview
    • Getting Started
      • Install Nightfall DLP for Salesforce
      • Upgrade Nightfall DLP for Salesforce
      • Configure Alerts for Salesforce
    • Nightfall Policies for Salesforce
      • Salesforce App Selection
      • Configure Scope for Salesforce
      • Configure Detection Rules for Salesforce
      • Configure Advanced Settings for Salesforce
      • Risk Score for Salesforce
      • Manage Salesforce Events
    • FAQs
  • Nightfall for Zendesk
    • Getting Started
      • Requirements
      • Install Nightfall DLP for Zendesk
      • Configure Alerts for Zendesk
    • Configure Policies for Zendesk
      • Zendesk App Selection
      • Configure Scope for Zendesk
      • Configure Detection Rules for Zendesk DLP
      • Configure Advanced Settings in Zendesk
      • Risk Score for Zendesk
      • Manage Zendesk Events
  • Nightfall for Notion
    • Getting Started
      • Requirements
      • Steps
    • Install Nightfall for Notion
      • Verification of Notion Installation
    • Configure Alerts for Notion
    • Configure Policies for Notion
      • Notion App Selection
      • Configure Detection Rules for Notion
      • Configure Advanced Settings for Notion
      • Risk Score for Notion
      • Manage Notion Events
  • NIGHTFALL FOR Generative AI Applications
    • Overview
    • Install Nightfall for GenAI apps
      • Install Nightfall DLP on Individual Devices
      • Install Nightfall DLP Across Organization
    • Configure Alerts for GenAI apps
    • Creating GenAI Policies from Nightfall Console
      • AI Apps Selection
      • Configure Detection Rules for AI Apps
      • Configure Advanced Settings for AI Apps
      • Risk Score for AI Apps
    • Nightfall Browser Plugin Deployment Guide
    • GenAI Safe Usage and Data Protection Policy
  • Developer Section
    • Nightfall Firewall for AI
    • Nightfall Playground
  • Settings
    • Users and Roles
      • Authentication Options
    • Role Based Access Control (RBAC)
      • Security Analyst Role
      • Policy Manager Role
      • Security Events Manager Role
      • Security Operations Manager Role
      • System Administrator Role
    • Directory Sync
      • Add Microsoft Entra ID to Nightfall
      • Google Workspace Directory Service
      • Add Okta to Nightfall
    • Custom Branding
    • Customer Referral Program
  • Frequently Asked Questions (FAQs)
    • How long does it take to deploy Nightfall?
    • How do I deploy Nightfall?
    • What are some unique points about Nightfall that I should know?
    • Which languages does Nightfall support?
    • How does Nightfall yield time savings for my team?
    • Nightfall vs Legacy DLP: What's the difference?
    • How does Nightfall make my organization more secure?
    • Nightfall vs CASB: What's the difference?
    • Nightfall vs E-Discovery: What's the difference?
    • How does Nightfall classify data?
    • What types of data does Nightfall classify?
    • Does Nightfall scan unstructured data?
    • Does Nightfall require data to be already tagged?
    • How do I learn more about and test out Nightfall?
    • Using Service Accounts with Nightfall
    • Which permissions are required for each integration?
    • Where can I find active user counts for each SaaS application protected by Nightfall?
    • In the Atlassian Marketplace, why does it show that the Nightfall app is not approved in security?
    • How can I estimate the data volume that Nightfall needs to scan?
    • How can I check the Platform Status of Nightfall
  • Login to Nightfall
  • Contact Nightfall
Powered by GitBook
On this page
  • Active Threats
  • Insights
  • Environment
  • Generating Reports
  • Analyzing Downloaded Reports
  • Analyzing Highest Risk Users Report
  • Analyzing Policy Violations Report
  • Analyzing Sensitive Data Exposure Report
  • Analyzing Total Data Scanned Report

Was this helpful?

Export as PDF
  1. Dashboard and Events

Nightfall Dashboard

Learn how to use the Nightfall Dashboard.

PreviousNightfall Sample Data SetsNextData Detection and Response Events

Last updated 9 days ago

Was this helpful?

The Nightfall Dashboard delivers a single‑pane view of your security posture, consolidating data from every native integration in your Nightfall console. At a glance, you’ll see:

  • Active Threats: Instantly surface and prioritize your highest‑risk alerts—click any item to jump straight to the violation details and start remediation.

  • Insights: Analyze trends in event volume, detection accuracy, and resolution ROI to optimize your security operations continuously.

  • Environment: Track scan volume, endpoint coverage, and capacity usage across all integrations in real-time.

Every visualization—widget, chart, or table—is interactive. Use filters for date range, integration, detector, status, and more to drill down into the exact data you need.

Active Threats

This section surfaces your most urgent threats in real-time so that you can address them quickly. Click any chart segment to jump straight to the corresponding violations screen—no manual searches or sorting required.

Detection and Response Events: This is a semi-circle visual display sall unresolved sensitive‑data events, broken out by risk level (Critical, High, Medium, Low). Click on a risk segment to navigate directly to those violations.

Exfiltration Events: Total exfiltration incidents logged over the last 30 days. Click to drill into the Events list and resolve threats.

Posture Events: This widget displays the number of posture‑related issues (e.g., misconfigurations or compliance gaps) recorded in the past 30 days. You can click the widget to drill down to the Events list and resolve them.

D&C Events: This widget displays the number of data classification events recorded in the past 30 days. You can click the widget to drill down to the Events list and resolve them.

Encryption Events: This widget displays the number of encryption events recorded in the past 30 days. You can click the widget to drill down to the Events list and resolve them.

Insights

This section enables you to monitor and optimize your security operations over time with metrics on detection accuracy, resolution efficiency, and ROI—across SecOps teams, end users, and automation.

This section displays the following widgets and charts.

  • Events Over Time: This bar graph displays the number of Events recorded across the selected time period. The x-axis represents time, and the y-axis represents the number of events. Data is segmented by integration, risk, policy, or resolution as applicable for the integration. You can click a bar to drill down to the list of respective events. You can also use the filter to view Event data specific to Data detection and Response, Posture, Exfiltration and data classification. Furthermore, you can also filter data based on specific time period.

  • Remediation Rate: This widget displays the percentage of events resolved. Data is segmented as follows:

  • Remediated: Events actively resolved to mitigate potential threats either by an Admin, End-User, or Automation.

  • Ignored: Events that require no further action.

  • False Positives (FP): Events annotated as false alerts either by an Admin or End-User.

  • Business Justification: Events dismissed with a provided business justification either by an Admin or End-User.

  • FP/Ignore Rate: This widget displays the percentage of events that are either ignored or classified as business justified or false positives. This metric reveals the noise level in your alerting system, showing how effectively your policy triggers and detection models minimize unnecessary alerts.

  • EU/Automation Rate: This widget measures the proportion of event management tasks handled by end-users and automated systems as opposed to those managed manually by the security operations team.

  • Mean Time to Resolution: This chart displays the average time taken to resolve an event from creation to closure. It provides valuable insights into the efficiency and responsiveness of your incident management process, helping reduce resolution times and minimize the risk of exposure.

  • Most Active Policies

    The Most Active Policies widget tracks security security events—one policy trigger each time a scanned resource contains ≥1 finding.

    • Findings vs. Events: Findings count individual detections (documents can have thousands); events count one trigger per resource.

    • True Positive Events: Policy triggers that correctly identify real security risks.

    • Ignored Events: Triggers you’ve chosen to dismiss.

      • Business Justification Findings: Annotated by admins or end-users to explain why a finding is acceptable (e.g., “Test data” or “Allowed by process”).

    • False Positive Events: Triggers later overturned as false alarms.

    • Expired Events: Triggers over 30 days old with no follow-up.

    These metrics are essential for refining your policy thresholds and cutting alert fatigue. Drill into any ignored or false-positive segment to inspect the underlying events, tweak rules or scopes, and confidently turn on automation.

  • Most Active Detectors

    The Most Active Detector widget tracks findings—each time our models flag sensitive data in a scanned document.

    • Findings vs. Events: Findings count individual detections (documents can have thousands); events count one trigger per resource.

    • True Positive Findings: Genuine security issues that have been resolved or confirmed.

    • Ignored Findings: Linked to violations you’ve dismissed.

    • Business Justification Findings: Annotated by admins or end-users to explain why a finding is acceptable (e.g., “Test data” or “Allowed by process”).

    • False Positive Findings: Marked as false alarms.

    • Expired Findings: Older than 30 days with no action.

    These metrics are vital for eliminating detection noise on your dataset. Your annotations feed into model retraining, boosting precision so you can safely expand automated actions. This widget is not currently clickable.

  • Highest Risk Users: This chart provides an overview of the users generating the highest number of detection events, segmented by risk score. It helps you identify outliers and pinpoint areas where specific user behaviours or data hygiene practices may need improvement.

  • End-User Remediation Events: This chart provides administrators with insights into end-user resolution actions by categorising requests into:

    • Pending: Requests awaiting a response.

    • Remediated: Cases where users have taken corrective action.

    • Justification: Instances where a business justification led to the event being ignored.

    • False Positive: Cases where users have annotated the event as a false positive.

When you click a segment it opens the detailed event information in the corresponding list view for rapid review and analysis.

Environment

Get a high‑level snapshot of your Nightfall deployment—scan volume, endpoint coverage, and capacity health—all in one place.

Data Pack Usage: This Data Usage widget provides an overview of your data scanning consumption versus your data purchased. Monitor usage trends and be alerted when additional capacity may be needed.

MacOS Endpoints: The Mac Endpoint widget shows the number of deployed endpoints for Mac devices. Quickly assess your endpoint coverage and ensure all devices are adequately protected.

Windows Endpoints: The Windows Endpoint widget shows the number of deployed endpoints for Windows devices. Quickly assess your endpoint coverage and ensure all devices are adequately protected.

Data Scanned: This widget displays the total volume of items and data scanned. Additionally, you can also view the amount of data used for scanning for each integration. Metrics for real-time scans and historical audits are provided. You can choose to view the data for the past 1 month, 3 months, 6 months, 1 year, or 2 years.

Generating Reports

Nightfall allows you download a PDF copy of the Dashboard data or email the dashboard data. If you choose to download a report, a PDF file containing the Dashboard data is downloaded.

If you choose to email the Dashboard data the following types of reports are present in the downloaded data.

  • Sensitive Data Exposure: This report consists of information like the location of sensitive data, the nature of sensitive data, and the overall risk associated with it.

  • Policy Violations: This report provides information on the policies that are generating the highest number of violations.

  • Highest Risk Users: This report provides information about users who are triggering the highest number of violations across all integrations.

  • Total Data Scanned: This report displays the total data scanned by Nightfall across all integrations.

To email a Dashboard Report:

  1. Click Generate Reports and select Send to email.

  2. Select the check boxes of the reports to be included. Click Select All to include all the reports.

  3. (Optional) Click Add Recipient to add additional recipients. By default the report is mailed to the logged in user.

  4. Select the time period for which you wish to download the report.

  5. Click Generate. A pop-up window appears that confirms the Email ID to which reports will be sent.

  6. Click Done.

Analyzing Downloaded Reports

When you generate a report, it is sent as an Email to the logged-in user. This email contains a link to download the reports. The download link expires in 7 days from the date you received the Email.

A folder is downloaded to your system. The folder is named as Nightfall_Reports_<date on which report was generated>_<historical time period>. This folder contains the reports that you selected for download in step 2 of the Generating Reports section. All the downloaded files are in CSV format.

The following image shows a folder downloaded on 26-11-2023 for the last 30 days. All four reports were selected for download hence you can see four CSV files.

Analyzing Highest Risk Users Report

The Highest Risk Users report is named as <date on which report was generated>highest_risk_users_<histroical time period selected>. This report displays the list of users who have triggered the maximum number of violations. The users are sorted in decreasing order of violations triggered. Hence the user who caused the highest number of violations is at the top and the user who triggered the lowest number of violations is at the bottom. This report also displays the integrations, policies, and Detection rules that were violated.

This report has the following columns.

Column Name
Description

User Name

The user name of the user who triggered the violation.

Integration

The integration(s) on which the user triggered the violation.

Violated Policies

The policy(ies) that the user violated.

Detection Rules

The detection rule(s) that the user violated.

All Violations

Active Violations

The total number of violations that were in active status at the time the report was downloaded.

Actioned Violations

The total number of violations that were in actioned status at the time the report was downloaded.

Quarantined Violations

The total number of violations that were in quarantined status at the time the report was downloaded.

Archived Violations

The total number of violations that were in archived status at the time the report was downloaded.

Reported Violations

The total number of violations that were in reported status at the time the report was downloaded.

Count of Likely

The total number of violations whose Likelihood was Likely, when the report was downloaded.

Count of Very Likely

The total number of violations whose Likelihood was Very Likely, when the report was downloaded.

Count of Possible

The total number of violations whose Likelihood was Possible, when the report was downloaded.

The following image shows a screenshot of the Highest Risk users report.

Analyzing Policy Violations Report

The Policy Violations report is named as <date on which report was generated>_policy_violations_<histroical time period selected>. This report displays the list of policies that triggered the violations. The policies are sorted in decreasing order of violations triggered. Hence the policy that triggered the highest number of violations is at the top and the policy that triggered the lowest number of violations is at the bottom. This report also displays the integrations, policies, detection rules, and detectors that were violated.

This report has the following columns.

Column Name
Description

Policy Name

The name of the policy on which the violation was triggered.

Policy UUID

The UUID of the policy on which the violation was triggered.

Policy Version

The version number of the policy on which the violation was triggered.

Integration

The name of the integration to which the policy belongs.

Detection Rules

The detection rules in the policy, that were violated.

Detection Rule UUIDs

The UUID of the detection rules in the policy, that were violated.

Detection Rules Version

The version number of the detection rules on which the violation was triggered.

Detectors

The detectors in the detection rules that were violated.

All Violations

Active Violations

The total number of violations that were in active status at the time the report was downloaded.

Actioned Violations

The total number of violations that were in Actioned status at the time the report was downloaded.

Quarantined Violations

The total number of violations that were in Quarantined status at the time the report was downloaded.

Archived Violations

The total number of violations that were in Archived status at the time the report was downloaded.

False Positives

The total number of false positive violations triggered by the policy.

Count of Likely

The total number of violations whose Likelihood was Likely, when the report was downloaded.

Count of Very Likely

The total number of violations whose Likelihood was Very Likely, when the report was downloaded.

Count of Possible

The total number of violations whose Likelihood was Possible, when the report was downloaded.

The following image shows a screenshot of the Policy Violations report.

Analyzing Sensitive Data Exposure Report

The Policy Violations report is named as <date on which report was generated>_sensitive_data_exposure_<histroical time period selected>. This report displays all the details of the sensitive data exposed. This report also displays the integrations, policies, detection rules, and detectors to which the sensitive information belongs to.

This report has the following columns.

Column Name
Description

Location

The location where the leaked sensitive information resides. This can be the

project name in which sensitive data resides for the JIRA integration, the folder name for the Google Drive integration, the instance name for Zendesk, the page name for the Notion integration, and the repository name for the GitHub integration.

Sub-Location

The sub-location where the leaked sensitive information resides. This can be the

URL of the ticket in which sensitive data resides for the JIRA integration, the URL for the Google Drive integration, the section name for the Notion integration, the ticket URL for Zendesk, and the file name for the GitHub integration.

Integration

The name of the integration from where the sensitive data was leaked.

Violated Policies

The name(s) of the policies that were violated as a result of the sensitive data leak.

Detection Rules

The name(s) of the detection rules that were violated as a result of the sensitive data leak.

Detectors

The name(s) of the detectors that were violated as a result of the sensitive data leak.

Active Violations

The total number of active violations on sensitive data.

Actioned Violations

The total number of actioned violations on sensitive data.

Archived Violations

The total number of archived violations on sensitive data.

Count of Likely

The total number of violations whose Likelihood was Likely, when the report was downloaded.

Count of Very Likely

The total number of violations whose Likelihood was Likely, when the report was downloaded.

Count of Possible

The total number of violations whose Likelihood was Likely, when the report was downloaded.

The following image shows a screenshot of the Sensitive Data Exposure report.

Analyzing Total Data Scanned Report

The Total Data Scanned report is named as <date on which report was generated>_stotal_data_scanned_<histroical time period selected>. This report displays all the details of the data scanned.

This report has the following columns.

Column Name
Description

Data Scanned (GB)

The total data scanned (in Gigabytes)

Items Scanned

The total number of items scanned.

All Violations

The integrations on which the scan was performed.

Active Violations

Actioned Violations

The total number of violations that were in Actioned status (due to the scan).

Quarantined Violations

The total number of violations that were in Actioned status.

Archived Violations

The total number of violations that were in Actioned status.

False Positives

The total number of false positive violations.

Count of Likely

The total number of violations whose Likelihood was Likely, when the report was downloaded.

Count of Ver Likely

The total number of violations whose Likelihood was Likely, when the report was downloaded.

Count of Possible

The total number of violations whose Likelihood was Likely, when the report was downloaded.

The following image shows a screenshot of the Total Data Scanned report.

The total number of violations triggered by the user (for the time period selected in ).

The total number of violations triggered by the policy (for the time period selected in ).

The total number of violations triggered from the scan (for the time period selected in ).

Nightfall Dashboard
Nightfall Dashboard
Nightfall Dashboard