Updated on 2025-08-12 GMT+08:00

Alerts

The identified risky access behaviors will be displayed on the Alerts page. You can view and review alert logs, as well as configure policies on this page.