Security Dashboard widget - Risk incidents
The Risk incidents widget comprises of Risk incidents and Top risk incidents widgets. The Risk incidents widget displays the total number of risk incidents on a specific day that contribute to a user's risk score. The Top risk incidents widget lists the top risk incidents for devices in the organization.
Risk incidents
The Risk incidents widget displays the total number of risk incidents on a specific date that contribute to a user's risk score. This data includes both active and resolved risk incidents. When a risk incident's contribution to the risk score becomes zero (incident decay), the risk incident is removed from the risk incidents count.
Example of the Risk incidents trend
In the following example, the graph displays the risk incidents trend for high, medium, and low risks for all dates from 7 Nov to 2 Dec. The high risks are displayed as a red line, the medium risks as an orange line, and the low risks as a yellow line. Hover over the graph to view the number of high, medium, or low risk incidents for a specific date.
![Risk incidents](../images/risk_management_risk_incidents.jpg)
Top risk incidents
The Top risk incidents chart lists the top risk incidents for devices in the organization. The incident type that impacts most devices is ranked first, and then ranked in decreasing order. Incident types are ranked by the number of devices that are affected by the risk. The Security Dashboard lists the statistics for the top risk incidents, including incident type, risk incidents, and the number of devices that are affected by the risk.
Example of statistics for the top risk incidents
![Top risk incidents](../images/risk_management_top_risk_incidents.jpg)
- Click on the number of affected devices to view a detailed summary of the devices that are
impacted by the listed incident type. These details include the device name (with device ID), device
platform, the user who owns the device, the incident severity, and the date and time that the
incident was detected.Note: To uniquely identify a device with a top risk incident, follow these steps:
- Locate the device ID that is listed in the Device name column.
- Copy the device ID.
- Go to Device Inventory, and search for the device by the device ID attribute.
Example of a detailed summary view for devices that were impacted by a device encryption incident