Sensitive data that isn’t used represents risk and adds little business value. However, sensitive data should be used only by approved individuals. Tracking this metric will provide an understanding of how active sensitive data is over time and help spot potential theft, abuse, or misuse.
From the list on the left, find “No. of events on sensitive files,” click on it to highlight the selection, and click the “>” arrow to move it to the selection field (Optional: select the color of the chart using the drop-down menu).
There should be fairly consistent, low-level fluctuations in the graph consistency just as people make use of the data on a day-to-day basis, with reasonable spikes during predictable times (e.g. financial data will be more active during the end-of-quarter or end-of-year reporting periods). Large spikes in activity at unusual times can represent an attempt to steal sensitive data.