Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 
 

Default Dashboards

Use the default dashboard to customize your items into functional views. These functional views focus on specific areas of your network.

The Dashboard tab provides five default dashboards that are focused on security, network activity, application activity, system monitoring, and compliance.

Each dashboard displays a default that is set of dashboard items. The dashboard items act as starting point to navigate to more detailed data. The following table defines the default dashboards.

Table 1: Default Dashboards

Default dashboard

Items

Application Overview

The Application Overview dashboard includes the following default items:

  • Inbound Traffic by Country (Total Bytes)

  • Outbound Traffic by Country (Total Bytes)

  • Top Applications (Total Bytes)

  • Top Applications Inbound from Internet (Total Bytes)

  • Top Applications Outbound to the Internet (Total Bytes)

  • Top Services Denied through Firewalls (Event Count)

  • DSCP - Precedence (Total Bytes)

Compliance Overview

The Compliance Overview dashboard includes the following default items:

  • Top Authentications by User (Time Series)

  • Top Authentication Failures by User (Event Count)

  • Login Failures by User (real-time)

  • Compliance: Username Involved in Compliance Rules (time series)

  • Compliance: Source IPs Involved in Compliance Rules (time series)

  • Most Recent Reports

Network Overview

The Network Overview dashboard includes the following default items:

  • Top Talkers (real time)

  • ICMP Type/Code (Total Packets)

  • Top Networks by Traffic Volume (Total Bytes)

  • Firewall Deny by DST Port (Event Count)

  • Firewall Deny by DST IP (Event Count)

  • Firewall Deny by SRC IP (Event Count)

  • Top Applications (Total Bytes)

  • Link Utilization (real-time)

  • DSCP - Precedence (Total Bytes)

System Monitoring

The System Monitoring dashboard includes the following default items:

  • Top Log Sources (Event Count)

  • Link Utilization (real-time)

  • System Notifications

  • Event Processor Distribution (Event Count)

  • Event Rate (Events per Second Coalesced - Average 1 Min)

  • Flow Rate (Flows per Second - Peak 1 Min)

Threat and Security Monitoring

The Threat and Security Monitoring dashboard includes the following default items:

  • Default-IDS/IPS-All: Top Alarm Signatures (real-time)

  • Top Systems Attacked (Event Count)

  • Top Systems Sourcing Attacks (Event Count)

  • My Offenses

  • Most Severe Offenses

  • Most Recent Offenses

  • Top Services Denied through Firewalls (Event Count)

  • Internet Threat Information Center

  • Flow Bias (Total Bytes)

  • Top Category Types

  • Top Sources

  • Top Local Destinations