Use the default dashboard to customize your items into
functional views. These functional views focus on specific areas of
your network.
The Dashboard tab provides five default dashboards that are focused on
security, network activity, application activity, system
monitoring, and compliance.
Each dashboard displays a default that is set of dashboard items.
The dashboard items act as starting point to navigate to more detailed
data. The following table defines the default dashboards.
Table 1. Default dashboards
Default dashboard |
Items |
Application Overview |
The Application Overview dashboard includes the following default items:
- Inbound Traffic by Country (Total Bytes)
- Outbound Traffic by Country (Total Bytes)
- Top Applications (Total Bytes)
- Top Applications Inbound from Internet (Total Bytes)
- Top Applications Outbound to the Internet (Total Bytes)
- Top Services Denied through Firewalls (Event Count)
- DSCP - Precedence (Total Bytes)
|
Compliance Overview |
The Compliance Overview dashboard includes the following default items:
- Top Authentications by User (Time Series)
- Top Authentication Failures by User (Event Count)
- Login Failures by User (real-time)
- Compliance: Username Involved in Compliance Rules (time series)
- Compliance: Source IPs Involved in Compliance Rules (time series)
- Most Recent Reports
|
Network Overview |
The Network Overview dashboard includes the following default items:
- Top Talkers (real time)
- ICMP Type/Code (Total Packets)
- Top Networks by Traffic Volume (Total Bytes)
- Firewall Deny by DST Port (Event Count)
- Firewall Deny by DST IP (Event Count)
- Firewall Deny by SRC IP (Event Count)
- Top Applications (Total Bytes)
- Link Utilization (real-time)
- DSCP - Precedence (Total Bytes)
|
System Monitoring |
The System Monitoring dashboard includes the following default items:
- Top Log Sources (Event Count)
- Link Utilization (real-time)
- System Notifications
- Event Processor Distribution (Event Count)
- Event Rate (Events per Second Coalesced - Average 1 Min)
- Flow Rate (Flows per Second - Peak 1 Min)
|
Threat and Security Monitoring |
The Threat and Security Monitoring dashboard includes the following
default items:
- Default-IDS/IPS-All: Top Alarm Signatures (real-time)
- Top Systems Attacked (Event Count)
- Top Systems Sourcing Attacks (Event Count)
- My Offenses
- Most Severe Offenses
- Most Recent Offenses
- Top Services Denied through Firewalls (Event Count)
- Internet Threat Information Center
- Flow Bias (Total Bytes)
- Top Category Types
- Top Sources
- Top Local Destinations
|