View Objects Detail Card
| Limited Availability: To access DSPM Data Explorer, contact Skyhigh Support. |
Ways to access the Objects Detail Card:
- Go to the Data Explorer page > Table View > Objects tab > click any Objects to view the Objects Detail Card.
- Go to the Data Explorer page > Chart View > Top 10 Risky objects tile > click any Objects to view the Objects Detail Card.
The Objects Detail Card provides the following information:
- The Risky Object Quick stats provide:
- Risk. The risk score of the object. Risk score is displayed from 1 to 9 and represented by a color code: Green is Low (1-3), Yellow is Medium (4-6), and Red is High (7-9). For more details on Object Risk, see Understand the Data Risk Calculations.
- Classifications. The number of classifications matched in the object.
- Users. The number of users who interacted with the object.
- The specific information of the risky objects is seen on the following tabs:
Overview Tab
This section provides key information about the identified risk, such as the date, time, service name and type, reason, classification, and related data:
- First Observed. The date and time when the object was first recognized as being at risk.
- Last Observed. The date and time when the object was last identified as being at risk.
- Service. The name of the service where the object was discovered.
- Detection mechanism. The object distribution is based on the detection mechanism, such as Forward Proxy, Email, API, Private Access, and RBI.
- Location. The key location or source information of the identified object.
- Risk Reason. The reason for the risk.
- Digests. A file digest is a concise digital summary of a file, characterized by a unique hash value derived from its contents. This digest can be copied and subsequently utilized in the Data Explorer page to filter files by their Digest/Hash.
- Classifications. The name of the classification to which the object's sensitive data belongs.

Users Tab
This section provides the key information about the users who interacted with the risky objects.
The Top 20 Users table provides:
- View all. Click to view all users utilizing this object in the Users tab.
- User. The name of the user.
- Object Risk. The risk distribution of objects accessible to the selected user.
- Total Objects. The total number of objects accessible to the selected user. The data count will vary based on the selected filter.
- Total Data. The total volume of the data accessible to the user. The data count will vary based on the selected filter.
- Last Observed. The date and time when the user last interacted with the object.

Objects Also Seen In Tab
This section provides an additional location or service where a copy of the same object file has been found. A single object can exist in various locations in your organization. For instance, Fred might edit a document in Google Drive and then email it to Bob, who saves it on the company's SharePoint. Skyhigh can recognize this single object across all these locations and link them together.
This tab provides:
- Service. The name of the service where the object was found.
- Object. The name of the object.
- Location. The key location or source information of the selected object.

Embedded Content Tab
This section details the data objects embedded or found within the selected object. Examples include PDF document embedded within an Excel spreadsheet, an Excel workbook embedded with an RTF document, files compressed within a zip archive, and attachments to an email.
This tab provides:
- Risk. The risk score of the embedded object.
- Object. The name of the object where the embedded object is stored.
- Location. The key location or source information where the embedded object is stored.


