Skip to main content

Risk Insights dashboard

The Risk Insights dashboard shows threats, suspicious activities, and security issues. Use it to detect compromised accounts, identify failed login attempts, monitor policy violations, and investigate risk events that need immediate attention. Data updates hourly.

Risk Insights dashboard showing threat detection and security monitoring

Countries Blocked by Login Policy

This map shows which countries are being blocked by your security policies.

What it shows: A world map showing which countries are blocked by your security policies. Shaded regions are blocked; unshaded regions are allowed.

Why it matters: Demonstrates that geo-blocking policies are working and alerts you to countries with high volumes of blocked login attempts.

When to check: As part of regular security audits or when investigating geographic patterns in failed authentications.

World map showing countries blocked by login policy

Leaked Credentials

This alert shows accounts with leaked passwords detected in public data breaches.

What it shows: Number of user accounts where passwords have been found in known data breach databases, indicating the account may be at risk of compromise. The chart breaks down compromised credentials by type: username and password, similar credential combinations, username only, or password only.

Why it matters: Leaked credentials are a primary attack vector for account takeover. Users with leaked passwords are at high risk even if their SecureAuth password is strong.

When to check: Daily or weekly to identify at-risk accounts that need immediate action like forced password resets or mandatory MFA.

What to do: Force affected users to reset their password and enable MFA on their account. Consider risk-based policies that require step-up authentication for these users.

Leaked credentials donut chart showing breakdown by credential type

Top Failed Authentications

This chart shows which accounts have the most failed login attempts.

What it shows: List of user accounts with the highest number of failed authentication attempts during the selected time period, ranked by failure count.

Why it matters: Multiple failed login attempts can indicate account compromise (attacker guessing password), brute force attacks, or user confusion about credentials.

When to check: During investigations of suspicious activity or as part of ongoing security monitoring.

What to do: Contact affected users to confirm they're not compromised. Check if failures are due to forgotten passwords (user error) or attack attempts (security threat).

Top failed authentications horizontal bar chart showing user accounts ranked by failure count

Top Low Assurance (LOA) Accounts

This chart shows accounts with consistently low Level of Assurance (LOA) scores.

What it shows: User accounts that frequently authenticate with low LOA scores, indicating weaker identity verification or higher risk factors.

Why it matters: Low LOA scores indicate the authentication didn't meet strong security standards. Users with consistently low scores may need additional authentication factors or verification.

When to check: To identify accounts that need stronger authentication requirements or policy upgrades.

What to do: Implement risk-based policies that require step-up authentication (MFA, passwordless) for low LOA authentications.

Top low assurance accounts horizontal bar chart showing user accounts ranked by LOA score

Top Password Reset Activity

This chart shows accounts requesting the most password resets.

What it shows: User accounts with the highest number of password reset requests during the selected time period.

Why it matters: Unusual password reset activity can indicate a user forgetting credentials (support burden) or an attacker trying to take over an account.

When to check: To identify users with repeated reset requests who might need help or whose accounts might be under attack.

What to do: Contact users with high reset activity. Offer support for forgotten password management or investigate if resets indicate compromise attempts.

Top password reset activity horizontal bar chart showing user accounts ranked by reset request count

Risk Event Details

This table shows individual risk events and incidents.

What it shows: Detailed log of security events like:

  • Failed authentication attempts
  • Policy violations (geographic blocks, velocity checks)
  • Leaked credential matches
  • Unusual authentication patterns
  • Step-up authentication triggers

Why it matters: Provides detailed visibility into what's happening on your system and helps you investigate specific security incidents.

Columns in the table:

ColumnDescription
TimestampWhen the risk event occurred (date and time).
UsernameThe user account affected by the event.
Device IPIP address where the authentication attempt originated.
CountryGeographic location of the login attempt.
Device TypeType of device used (Desktop, Mobile, Laptop, Tablet, etc.).
LOA ScoreLevel of Assurance score as a percentage, indicating authentication confidence.
Risk DetailsSpecific information about the risk (Tor detected, Geo-restricted country access, leaked credential match, etc.).

When to check: Investigate specific security incidents or audit suspicious activity patterns.

Risk Event Details table showing authentication events with timestamp, username, device IP, country, device type, LOA score, and risk details

How to use this dashboard

  1. In SecureAuth Connect, from the left menu, go to Analytics > Risk Insights.
  2. Use the date range picker at the top to select the time period you want to analyze.
  3. Review each section for threats and suspicious activity.
  4. Click on specific events in the Risk Event Details table to investigate further.

When to escalate

Contact your security team if you see:

  • Sudden spike in failed authentications
  • Multiple accounts with leaked credentials
  • Coordinated activity from blocked countries (possible brute force attack)
  • Accounts with consistently low LOA scores
  • Unusual geographic patterns or velocity

See also