Understanding Red Flag Icons, Colors, and Categories

This guide is for school administrators and wellbeing staff.

Red Flags are tags that indicate the category and frequency of potentially risky web content users are attempting to access.

Icons and Colors of Risk Indicators

You can identify the frequency and types of risky online activity by the color and clustering of the Red Flags in the Risk Indicators column.

The categories may contain both the content the user was allowed to access and was blocked from accessing. If you need to see the details of the content a user was blocked from accessing, go to the Blocked Report tool and select the user you are concerned about.

Red Flag Icons

You can quickly recognize the category of the Risk Indicator by the following icons.

icon_globe.png A Globe means the user accessed or was trying to access content hosted on websites or web servers.
icon_gear.png A Gear means the user used or tried to use apps and services, like VPNs, that may bypass filtering.
icon_magnifying-glass.png A Magnifying Glass will only be displayed with keywords from the search engines your IT Admin has set up (like Google, Bing, and the YouTube website).

Red Flag Colors

While we refer to these elements as “Red Flags”, you will notice two other colors in the Risk Indicators. We often refer to the Risk Indicators as Red Flags because these tags appear in the Red Flags reports, dashboard tiles, and columns. The color of the Risk Indicator lets you know how frequently the user attempted to access this category of content for this category of online content.




Red indicates frequent attempts to access potentially risky content or conduct an unsafe search.

This user's total number of attempts was greater than 5% of the blocked attempts in this category for all of the users in School Manager. Users with the highest count of red indicators will appear at the top of Red Flag lists in your dashboard, report pages, and email reports. Will be associated with the device, website, or search activity.




Pink indicates consistency in accessing potentially risky content or conducting an unsafe search.

This user's total number of attempts in this category is between 2% and 5% compared to the total attempts in this category for all users. Users usually appear in the middle of Red Flag lists with only pink and blue indicators.




Blue indicates a user has attempted to access potentially risky content or use unsafe search keywords on a few occasions, typically once or twice within the selected time period.

The total number of attempts in this category is less than 2% of the attempts compared to all other users. Users usually appear at the bottom of Red Flag lists if they only have blue categories.

Red Flag Categories

Overall, you will be able to assess potential threats by reviewing a common set of categories of Risk Indicators:

Academic Dishonesty Intelligent systems (AI Tools) that may be used to cheat on exams and assignments
Adult Content Websites and apps known to host videos, images, and audio of sexual or explicit content
Adult Content Search Keywords, slang, or code words associated with sexual or explicit content
Bullying Online activities causing psychological harm by repeated aggressive actions like teasing, shaming, rejecting, or criticizing a person, especially on social media or within a social group
Depression Negative feelings interfering with healthy social and mental interactions
Devices An excessive number of devices are logged on with a student’s account, which may indicate a user sharing their login information with other users.
Hate Speech Threatening or abusive activities directed at traits and labels associated with groups of people
Offensive Content Inappropriate topics such as vulgar and explicit language, images, video, or audio that does not fit standard categories like Adult Content or Hate Speech
Substance Abuse Tobacco, alcohol, and drugs, including behaviors associated with addiction
Suicide Ending one’s life, which may include self-harm and associated behaviors
Violence Planning or threatening harm, death, or damage to people, property, or objects of emotional or financial value
VPN Apps and services used to hide online activity, anonymize a user's identity on a safe network, and bypass filtering.
Was this article helpful?
0 out of 0 found this helpful



Please sign in to leave a comment.