Role Availability | Read-Only | Investigator | Analyst | Manager |
This dashboard includes three separate sections.
SIEM Section
SIEM Security Information and Event Management (SIEM) systems employ a variety of separate tools to monitor host and network resources for threat activity and compliance status. security intelligence combines and correlates collected logs and other data to find malicious Activity in a system that exceeds or misuses that access in a manner that negatively affects the confidentiality, integrity, or availability of the organization's information systems. patterns in network traffic and within host Reference to a computer on a network. activity.
Asset Discovery Section
Asset An IP-addressable host, including but not limited to network devices, virtual servers, and physical servers. Discovery discovers assets in your environment, detects changes in assets, and discovers malicious assets in the network.
Widgets | Description |
---|---|
Top Operating Systems | List of the top operating systems Software that manages computer hardware resources and provides common services for computer programs. Examples include Microsoft Windows, Macintosh OS X, UNIX, and Linux. on assets. |
Asset Information |
Software Inventory refers to the total number of assets having software installed Assets Discovered refers to the total number of assets discovered by the user. |
Top Assets with Alarms | List of the top 5 assets having the most alarms. |
Vulnerability Assessment Section
Vulnerability Assessment Vulnerability assessment uses active network vulnerability scanning and continuous vulnerability monitoring to provide one of the five essential capabilities. identify vulnerabilities or compliance by comparing the installed software on assets with a database of known vulnerabilities.
Widgets | Description |
---|---|
Assets with Vulnerabilities | Total number of assets having vulnerabilities for the current day and for the current week. |
Vulnerabilities | Total number of vulnerabilities in your environment. |
Vulnerabilities by Severity | Top vulnerabilities ordered by severity. See About Vulnerability Severity |
Most Vulnerable Assets | List of most vulnerable assets. |