Default dashboards

Use the default dashboard to customize your items into functional views. These functional views focus on specific areas of your network.

The Dashboard tab provides five default dashboards that are focused on security, network activity, application activity, system monitoring, and compliance.

Each dashboard displays a default that is set of dashboard items. The dashboard items act as starting point to navigate to more detailed data. The following table defines the default dashboards.

Table 1. Default dashboards
Default dashboard Items
Application Overview
The Application Overview dashboard includes the following default items:
  • Inbound Traffic by Country (Total Bytes)
  • Outbound Traffic by Country (Total Bytes)
  • Top Applications (Total Bytes)
  • Top Applications Inbound from Internet (Total Bytes)
  • Top Applications Outbound to the Internet (Total Bytes)
  • Top Services Denied through Firewalls (Event Count)
  • DSCP - Precedence (Total Bytes)
Compliance Overview
The Compliance Overview dashboard includes the following default items:
  • Top Authentications by User (Time Series)
  • Top Authentication Failures by User (Event Count)
  • Login Failures by User (real-time)
  • Compliance: Username Involved in Compliance Rules (time series)
  • Compliance: Source IPs Involved in Compliance Rules (time series)
  • Most Recent Reports
Network Overview
The Network Overview dashboard includes the following default items:
  • Top Talkers (real time)
  • ICMP Type/Code (Total Packets)
  • Top Networks by Traffic Volume (Total Bytes)
  • Firewall Deny by DST Port (Event Count)
  • Firewall Deny by DST IP (Event Count)
  • Firewall Deny by SRC IP (Event Count)
  • Top Applications (Total Bytes)
  • Link Utilization (real-time)
  • DSCP - Precedence (Total Bytes)
System Monitoring
The System Monitoring dashboard includes the following default items:
  • Top Log Sources (Event Count)
  • Link Utilization (real-time)
  • System Notifications
  • Event Processor Distribution (Event Count)
  • Event Rate (Events per Second Coalesced - Average 1 Min)
  • Flow Rate (Flows per Second - Peak 1 Min)
Threat and Security Monitoring
The Threat and Security Monitoring dashboard includes the following default items:
  • Default-IDS/IPS-All: Top Alarm Signatures (real-time)
  • Top Systems Attacked (Event Count)
  • Top Systems Sourcing Attacks (Event Count)
  • My Offenses
  • Most Severe Offenses
  • Most Recent Offenses
  • Top Services Denied through Firewalls (Event Count)
  • Internet Threat Information Center
  • Flow Bias (Total Bytes)
  • Top Category Types
  • Top Sources
  • Top Local Destinations