Home > dashboard > Risk Posture
Export to PDFBy bringing together the following critical security dimensions, the Risk Posture dashboard enables administrators to quickly assess overall risk levels, measure compliance effectiveness, and make data-driven decisions to strengthen the organization's security posture:
- **Drives with high-risk objects** - Highlights user drives and shared drives containing high-risk objects, providing visibility into potential security vulnerabilities.

- **Orphaned** **shared** **drives** – Orphaned drives are shared drives that lack active ownership or management. This section helps identify such drives to ensure proper governance, reduce security risks, and maintain accountability for content and access controls.

- **Drives shared with external users** – Monitors both user drives and shared drives that have been shared with external users. It supports external collaboration and helps prevent unintended exposure of sensitive organizational data.

- **User drive** **policy** **compliance** – Monitors the enforcement of policies on user drives here, including how many are actively monitored, violations detected, and those automatically resolved. This section aids in measuring the effectiveness of automated policy enforcement and compliance workflows.

- **Shared drive policy compliance** – Tracks policy implementation on shared drives, showcasing the number of drives under monitoring, violations identified, and those remediated automatically. It reflects the health of policy governance across collaborative workspaces.

- **Sensitive objects and** **exposure** – Provides insight into sensitive objects and their exposure levels – whether shared publicly, externally, or with target audiences. This section enables rapid response to potential data leaks and reinforces sensitive information handling protocols.

- **Mailbox policy compliance** – Provides review of policy compliance for mailboxes, including monitoring coverage, detected violations, and automatically resolved issues. This ensures email communication aligns with organizational security and compliance standards.

- **Top 5 data types** – Displays the most frequently occurring sensitive data types in your environment. Understanding these trends helps focus data protection strategies and regulatory compliance efforts.

- **Ungoverned users** – Tracks external users, orphaned users, and unmanaged users in this section. Identifying these users helps reduce identity-related risks and ensures all users are under appropriate governance controls.

- **Risky groups** – Highlights groups containing external users and orphaned groups. Monitoring these groups helps maintain access control integrity and reduces security risks.

- **User policy compliance** – Monitors policy enforcement for users, including how many are monitored, violations detected, and those automatically resolved. This helps ensure user activities comply with organizational policies.

- **Group policy compliance** – Tracks policy implementation for groups in this section, including monitoring coverage, violations identified, and automated resolutions. This maintains security across group-based collaborations.

- **Public and organization links** – Monitors total number of sharing links created for public and organization-wide access, with highlighted numbers of sensitive records. Tracking these links helps control data exposure and maintain sharing governance.
