Policy Enforcer Dashboard Widgets
Policy enforcer adds widgets to the dashboard that provide a summary of all gathered information on compromised content and hosts. Drag and drop widgets to add them to your dashboard. Mouse over a widget to refresh, remove, or edit the contents.
In addition, you can use the dashboard to:
Navigate to the File Scanning page from the Top Scanned Files and Top Infected Files widgets by clicking the More Details link.
Navigate to the Hosts page from the Top Compromised Hosts widget by clicking the More Details link.
Navigate to the Command and Control Servers page from the C&C Server Malware Source Location widget.
C&C and GeoIP filtering feeds are only available with the Cloud Feed or Premium license.
Available dashboard widgets are as follows:
Widget |
Definition |
---|---|
Top Malware Identified |
A list of the top malware found based on the number of times the malware is detected over a period of time. Use the arrow to filter by different time frames. |
Top Compromised Hosts |
A list of the top compromised hosts based on their associated threat level and blocked status. |
Top Infected File Types |
A graph of the top infected file types by file extension. Examples: exe, pdf, ini, zip. Use the arrows to filter by threat level and time frame. |
Top Infected File Categories |
A graph of the top infected file categories. Examples: executables, archived files, libraries. Use the arrows to filter by threat level and time frame. |
Top Scanned File Types |
A graph of the top file types scanned for malware. Examples: exe, pdf, ini, zip. Use the arrows to filter by different time frames. |
Top Scanned File Categories |
A graph of the top file categories scanned for malware. Examples: executables, archived files, libraries. Use the arrows to filter by different time frames. |
C&C Server and Malware Source |
A color-coded map displaying the location of Command and Control servers or other malware sources. Click a location on the map to view the number of detected sources. |