Reporting | Insights

What are reports in Insights?

Reports are curated by our Security Research experts and cover various aspects of identity security. Each report is designed to give you a clear and immediate understanding of your organization's identity security posture via visual aids such as heat maps, trend graphs, and detailed breakdowns.

How are they useful?

Use Insights reports to quickly assess risk and focus on critical findings.

Go to Reporting

  1. From the top left of the page, click > Insights > Reporting.
    The Reports page displays.
  2. Alternatively, click > Reporting > Insights > Reporting.

The Reports page

The Reports page in Identity Security Insights.
  1. Navigation menu: Access BeyondTrust apps and their menus, and Pathfinder administration pages if you are assigned as an administrator.
  2. Header: Select a site or Administration from the menu, manage your profile, and change the display theme.
  3. Reports list: Expand the report category to view the reports in the category.
  4. Report tiles:  Click a report tile to view the collected data. Use the report controls to bookmark, filter, export, or refresh the data.

Report and widget controls

  • Report controls: Bookmark, filter, or export a report using the main controls at the top of the report.
  • Widget controls: Select a tile and use widgets to minimize and maximize the tile display, filter, and export are some of the available actions.
Report and widget controls

Reports

Dashboard

NameDescription
Cloud Identity & Risk OverviewQuickly assess cloud identity and access risk posture across AWS, Azure and Google Cloud.
High Risk AccountsProvides a comprehensive view of administrative accounts, privilege trends, account health, and security recommendations over time.
Identity Security Risk AssessmentA summary of the important findings from your environment. This report is broken down into sections relating to Human and Non-Human Account Privilege, Identity Risk & Hygiene and areas of Exposure which can help direct your efforts to secure your environment.
Identity ThreatsProvides a detailed overview of detection and recommendation statuses, trends, and severities.
MITRE ATT&CK®Threat activity mapped to the MITRE framework.

Endpoint and Server Access Risk

NameDescription
Local AccountsLocal accounts on computers, databases, and network devices by asset and account type.
SSH KeysSSH Keys listed by computer, account name, local privilege, cipher type, and more.
Scanned AssetsAssets scanned by Password Safe and any collected information.
Users with Access to EndpointsEvery user with group or user-based access with local privilege and group paths.

Github

NameDescription
Github Repo OverviewOverview of all of your repos, which repos are forked, as well as all of the security features applied to each repo.

Identity Security Summary

NameDescription
Account SummaryDashboard view of accounts collected by your configured connectors.
DetectionsDetections in your environment.
Detections TrendDetections tripped over time, enabling insight into trends from your environment.
Dormant AccountsAccounts that have been dormant for 60 or more days.
Entitlement SummaryFine-grained access entitlements collected such as authorizations, privileges, access rights, permissions or rules.
Group Access ExplorerAllows investigation of direct access that a group has in Active Directory.
Identity SummarySummarization of Identities discovered from the configured connectors.
Inventory SummaryDashboard view of accounts, identities, and entitlements.
Non-Human IdentitiesA centralized dashboard for tracking, analyzing, and managing interactions, behaviors, and attributes of non-human entities such as bots, AI agents, digital personas, or synthetic identities across platforms.
RecommendationsRecommendations in your environment.
Recommendations TrendRecommendations over time that give you insight into trends in your environment.

Password Integrity

NameDescription
Blank PasswordsAccounts with passwords that are blank.
Compromised PasswordsAccounts with passwords that are known to be compromised.
Password Health OverviewShows an overall view into the health of Active Directory account passwords.
Shared PasswordsGrouping of accounts that share a password.

Security Frameworks

NameDescription
MITRE ATT&CK® MatrixProvides an overview of findings mapped to MITRE tactics and techniques.
MITRE ATT&CK® OverviewVisualizes detected tactics, techniques, and threat actors to help security teams identify coverage gaps, understand adversary behavior, and prioritize defensive actions.
NIST 800-53 OverviewOverview of cybersecurity posture aligned with the NIST 800-53 Cybersecurity Framework. Tracks key controls across Identify, Protect, Detect, Respond, and Recover to support compliance, risk monitoring, and strategic security improvements.

Service and Task Identity Risk

NameDescription
Accounts Used for Tasks and Services on ComputersDirectory and local accounts running services, scheduled tasks, and IIS application pool. Includes account privilege and compensating controls.
All Non-Human AccountsAll non-human accounts, including service accounts, and their true privilege. Includes Entra ID service principals and domain accounts. The report also shows the number of entities using the account and the most recent authentication or login.

System Health

NameDescription
Connector Data HealthTrend on collected data from connectors configured.

Preview

Reports in this section are undergoing testing and feedback. Once finalized, the reports will have a permanent home in one of the above sections.


©2003-2026 BeyondTrust Corporation. All Rights Reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust is not a chartered bank or trust company, or depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.