About Network Security Management

Dashboards

Dashboard enables you to visualize status of the security infrastructure, assess the performances, and monitor the issues that need investigation, at a glance. The analytical dashboard NSM provides is an optimal solution to quickly analyze the cyber security risks and recognize how to resolve them.

NSM dashboard provides a comprehensive overview of the status of devices, traffic distribution, and all the threats by the type for the users to prepare and respond to them when required. This also helps the users to improve the control over their cyber security measures.

The system dashboard NSM provides has four tabs:

  • Devices
  • Summary
  • Network
  • Threat

The default view is Devices dashboard.

Devices

The DEVICE tab on the dashboard shows the summary of the devices and alerts in your infrastructure.

The DEVICE tab shows you a summary of your devices:

  • FIREWALLS: Displays the number of firewalls that you intend to manage through NSM. Click FIREWALLS to list the firewalls in the page.
  • OFFLINE: Displays the number of firewalls that are offline. Click OFFLINE to list the offline devices in the page.
  • EXPIRING LICENSES: Displays the number of expiring licenses.
  • GROUPS: Displays number of device groups. Click GROUPS to list the device groups.
  • USERS: Displays the number of CSC users online.

The FIREWALL OVERVIEW section shows the status of all devices, number of devices Online and Managed, Offline, Online and Unmanaged, Unassigned, and with the Expired Licenses. A pie chart representation of firewall overview is also displayed. The geographical locations of the firewalls are shown on the map. Hover the mouse over the map or scroll the list on the right-hand side to view more details of the devices in a particular location.

The Alert Center is shown at the bottom of the dashboard. An alert summary is provided and you can click on any of the categories—All, Device, Config, User, or General to view the details of the selected category in the Notification Center. You can also view the most recent alerts in the table below the summary. The table lists the details including Local Time, Category of the device, Priority, Source IP, Tenant Name, and Request ID.

Summary

The Summary tab shows Traffic Distribution, Top Users, Observed Threats, and Top Devices by Sessions in your network infrastructure for the period selected in the slider at the top. These sections provide the Map, Graph, and List views to navigate into the details.

The Top Devices by Sessions data can be filtered down further to get the statistics of Data Sent, Data Received, Applications, Viruses, Intrusions, Spyware, and Botnet Blocked.

The Summary tab also shows the Insights section giving information about the number of infected hosts and the number of Critical Attacks. You can drill down further by selecting the Date or Alphabetical order. The search options provided in this page help you to find the details faster. You can also search and filter your data using the options All, Spotlight, Malware, Ransomware, or Intrusions.

The Summary tab also provides additional information on key logging and the potent key loggers.

Network

The Network tab shows data pertaining to transactions in your network infrastructure. This include the details of Top Applications by Sessions, Top Addresses by Sessions, Top Users by Sessions, and Top Web Categories from which the connections are initiated. Each space enables you to filter the data with available options

You can analyze the data for top applications, top addresses, and top users by sessions and drill down to get the statistics. This include Data Sent, Data Received, Virus, Intrusions, Spyware, Access Rule Blocked, Threats Blocked, GEO-IP Blocked, Botnet Blocked, Total Data Transferred, and Total Blocked.

All these sections provide Graph and List views to navigate into the details. You can also drill down further by clicking on the View Details link.

Threat

The Threat tab shows the details of threats by type including the Top Viruses, Top Intrusions, Top Spywareand Top Botnet.

All these sections provide Graph and List views to navigate into the details. You can drill down further by clicking on the View Details link.

Was This Article Helpful?

Help us to improve our support portal

Techdocs Article Helpful form

  • Hidden
  • Hidden

Techdocs Article NOT Helpful form

  • Still can't find what you're looking for? Try our knowledge base or ask our community for more help.
  • Hidden
  • Hidden