Risky Objects

The Risky objects page provides a list of files and objects identified as potential security risks within your Google environment. It allows you to quickly assess and prioritize remediation efforts based on the calculated risk, sensitivity, and exposure levels of each item.

Risky objects.

The following actions are available above the table on this page:

- **Filter** – Click **Filters** in the upper-right corner of the table. Click the expand button to the right of a column to show the text box or selectable options. Enter keywords in the text box and/or select desired options to define the filter conditions. - **Manage columns** – Click **Columns** in the upper-right corner of the table, and the drop-down list where all available columns are displayed appears. Select the columns that you want to display in the table and click **Apply** to apply the column selection. You can also choose **Select all** to show all columns in the table. - **Refresh** – Click the Refresh icon to retrieve the latest object information.

The following options are available in the Comments column or the Action) drop-down list for each object listed in the table.

- **Add comments** – In the **Comments** column, click **Add** to add comments to the object. If needed, you can add multiple comments to one object. If an object already has comments added, click the Comment icon to view the comment details or add more comments to it. - **View details** – This option allows you to view the risk level, permission report, and activity report of an object. For more information, refer to . - **View permissions** – This option allows you to access the [View Object Permissions](#missing-link) page of the object. - **View activities** – This option allows you to access the [View Object Activities](#missing-link) page of the object.

View Object Details

On the object details page, information are displayed in the following three tabs:

- **Permissions** – You can view the permission-related information, including the number of user or groups who have permissions to the object, their roles, user type, and permission expiration time. **Refresh** – Click the Refresh icon to refresh the users and groups displayed in the table. - **Activities** – All activities within the object are displayed. You can click **Filters** to narrow down the display scope or click the Refresh icon to refresh the activities displayed in the table. - **Details** – The basic information of the object is displayed under **Basic information**. You can click the Copy button to copy the URL and location of the object. Under **Risk information**, the risk level, exposure level and exposure rule, and sensitivity level of the object are displayed.

View Object Permissions

The users and groups who have permissions to the object are listed in the table with the following columns:

- **User/Group** – The user or group that has permissions to the object, or the shared link to the object. Hover your mouse over the user/group name to view the full username or group email. - **Role** – The role in the object the user/group has. - **Type** – The type of the user or group. - **Created** – If the object is shared via link, the created time will be displayed. - **Expiration** **time** – If the object is shared via link, the expiration date of the link will be displayed here.

View Object Activities

On the View activities page, activities are listed in the table and sorted by Activity time in descending order. The activities for the object of the users to whom you have permissions, or the user activities for the objects to which you have permissions will be displayed on this page.

Click Filters to filter activities and only display the matched activities in the table.

Click the Refresh icon to refresh the activities displayed in the table.

In the Basic information tab, you can view the basic information of the object. You can click the Copy button to copy the URL and location of the object.