Overview
Each row represents a detected event tied to a user and a source application. Use the table to scan recent activity, compare severity, and open a row when you need full context. Threat events complement Enforcement events, which log actions taken in response to policy or workflow—not raw detections.The Events Table
The table lists events in reverse chronological order. Columns group identity, origin, classification, and severity so you can triage without opening every row.
| Column | Description |
|---|---|
| Time | When the event was recorded. |
| User | The account or person associated with the activity. |
| Source | The integrated application (and subtype where shown) that produced the signal. |
| Category | The threat or behavior type assigned to the event. |
| Severity | How serious the event is rated (Low, Medium, or High). |

