This guide is for school administrators and wellbeing staff.
Red Flags are tags that indicate the category and frequency of potentially risky web content users are attempting to access.
Icons and Colors of Risk Indicators
You can identify the frequency and types of risky online activity by the color and clustering of the Red Flags in the Risk Indicators column.
The categories may contain both the content the user was allowed to access and was blocked from accessing. If you need to see the details of the content a user was blocked from accessing, go to the Blocked Report tool and select the user you are concerned about.
Red Flag Icons
You can quickly recognize the category of the Risk Indicator by the following icons.
|A Globe means the user accessed or was trying to access content hosted on websites or web servers.|
|A Gear means the user used or tried to use apps and services, like VPNs, that may bypass filtering.|
|A Magnifying Glass will only be displayed with keywords from the search engines your IT Admin has set up (like Google, Bing, and the YouTube website).|
To capture Bing and Google search terms and YouTube keywords, your IT support needs to enable MITM and HTTPS Inspection.
Red Flag Colors
While we refer to these elements as “Red Flags”, you will notice two other colors in the Risk Indicators. We often refer to the Risk Indicators as Red Flags because these tags appear in the Red Flags reports, dashboard tiles, and columns. The color of the Risk Indicator lets you know how frequently the user attempted to access this category of content for this category of online content.
|Red indicates frequent attempts to access potentially risky content or conduct an unsafe search.
This user's total number of attempts were greater than 5% of the blocked attempts in this category for all of the users in School Manager. Users with highest count red indicators will appear at the top of Red Flag lists in your dashboard, report pages, and email reports. Will be associated with the device, website, or search activity.
|Pink indicates some consistency in trying to access potentially risky content or conduct an unsafe search.
This user's total number of attempts in this category are between 2% and 5% compared to the total attempts in this category for all users. Users will usually appear in the middle of Red Flag lists when they have only pink and blue indicators.
|Blue indicates a user has attempted to access potentially risky content or use unsafe search keywords on a few occasions, typically once or twice within the selected time period.
The total number of attempts in this category are less than 2% of the attempts compared to all other users. Users usually appear at the bottom of Red Flag lists if they only have blue categories.
Red Flag Categories
Overall, you will be able to assess potential threats by reviewing a common set of categories of Risk Indicators:
|Academic Dishonesty||Intelligent systems (AI Tools) that may be used to cheat on exams and assignments|
|Adult Content||Websites and apps known to host videos, images, and audio of sexual or explicit content|
|Adult Content Search||Keywords, slang or code words associated with sexual or explicit content|
|Bullying||Online activities causing psychological harm by repeated aggressive actions like teasing, shaming, rejecting or criticizing a person, especially on social media or within a social group|
|Depression||Negative feelings interfering with healthy social and mental interactions|
|Devices||An excessive number of devices are logged on with a student’s account, which may indicate a user sharing their login information with other users|
|Hate Speech||Threatening or abusive activities directed at traits and labels associated with groups of people|
|Offensive Content||Inappropriate topics such as vulgar and explicit language, images, video or audio that does not fit standard categories like Adult Content or Hate Speech|
|Substance Abuse||Tobacco, alcohol, and drugs, including behaviors associated with addiction|
|Suicide||Ending one’s life which may include self-harm and associated behaviors|
|Violence||Planning or threatening harm, death or damage to people, property or objects of emotional or financial value|
|VPN||Apps and services used to hide online activity, anonymize a user's identity on a safe network, and bypass filtering|
Please sign in to leave a comment.