After the data security administrator completes the sensitive data rule configuration T + 1, you can view the data distribution in identifying the data distribution, it is divided into overall distribution, hierarchical distribution, and field details.

Depending on your query needs, filter your selections by project, rule name, rule type, risk level (that is, grading), and so on.