Use the default dashboard to customize your items into functional
views. These functional views focus on specific areas of your network.
The Dashboard tab provides five default dashboards
that are focused on security, network activity, application
activity, system monitoring, and compliance.
Each dashboard displays a default that is set of dashboard items.
The dashboard items act as starting point to navigate to more detailed
data. The following table defines the default dashboards.
Table 1: Default DashboardsDefault dashboard
|
Items
|
Application Overview
|
The Application Overview dashboard
includes the following default items:
Inbound Traffic by Country (Total Bytes)
Outbound Traffic by Country (Total Bytes)
Top Applications (Total Bytes)
Top Applications Inbound from Internet (Total Bytes)
Top Applications Outbound to the Internet (Total Bytes)
Top Services Denied through Firewalls (Event Count)
DSCP - Precedence (Total Bytes)
|
Compliance Overview
|
The Compliance Overview dashboard
includes the following default items:
Top Authentications by User (Time Series)
Top Authentication Failures by User (Event Count)
Login Failures by User (real-time)
Compliance: Username Involved in Compliance Rules (time
series)
Compliance: Source IPs Involved in Compliance Rules (time
series)
Most Recent Reports
|
Network Overview
|
The Network Overview dashboard
includes the following default items:
Top Talkers (real time)
ICMP Type/Code (Total Packets)
Top Networks by Traffic Volume (Total Bytes)
Firewall Deny by DST Port (Event Count)
Firewall Deny by DST IP (Event Count)
Firewall Deny by SRC IP (Event Count)
Top Applications (Total Bytes)
Link Utilization (real-time)
DSCP - Precedence (Total Bytes)
|
System Monitoring
|
The System Monitoring dashboard
includes the following default items:
Top Log Sources (Event Count)
Link Utilization (real-time)
System Notifications
Event Processor Distribution (Event Count)
Event Rate (Events per Second Coalesced - Average 1 Min)
Flow Rate (Flows per Second - Peak 1 Min)
|
Threat and Security Monitoring
|
The Threat and Security Monitoring dashboard includes the following default items:
Default-IDS/IPS-All: Top Alarm Signatures (real-time)
Top Systems Attacked (Event Count)
Top Systems Sourcing Attacks (Event Count)
My Offenses
Most Severe Offenses
Most Recent Offenses
Top Services Denied through Firewalls (Event Count)
Internet Threat Information Center
Flow Bias (Total Bytes)
Top Category Types
Top Sources
Top Local Destinations
|