Dashboards

The Dashboards feature provides interactive, visual dashboards that summarize data, product capabilities, and the state of your environment.

Dashboards allows you to easily view pertinent information in visuals that feed from live data in your environment. Most visuals allow you to click items to view the source of the data in the visual. This allows you to drill down further into issues immediately on the corresponding page in the Alert Logic console, and streamline your response actions.

Alert Logic offers partners and customers with managed accounts two additional dashboards. For more information, see the following:

About the dashboards

Alert Logic curated different dashboards, which are composed of visuals to present how you interact with data and capabilities in your environment, and quickly track existing issues. The default dashboard view is Threat Summary. You can use the drop-down menu on the top left to view the other available dashboards. The following are some available dashboards:

  • Threat Summary
  • Vulnerability Summary
  • Automated Response Summary
  • Email Security Summary
  • TRI Summary
  • Coverage and Health
  • Endpoint Protection
  • File Integrity Monitoring
  • Web Log Analytics (WLA)
  • Firewall Log Volume Analysis
  • Firewall Log Security Analysis
  • Authentication Management Summary
  • Authentication Management Security

Threat Summary dashboard

The Threat Summary dashboard provides visibility into threats and incidents in your environment, including open incidents, incident threat levels and trend, classes of, countries where incidents originate, most attacked deployments and hosts, top attackers, and a peer incident classification comparison chart. Use this dashboard to gain insights into the types of incidents that were detected in your environment, analyze the effectiveness of your current incident response efforts, and learn about emerging threats. To learn more about this dashboard, see Threat Summary Dashboard.

Vulnerability Summary dashboard

The Vulnerability Summary dashboard provides visibility into vulnerable software and cloud infrastructure in your environment, including lists of most seen vulnerabilities, most vulnerable hosts, top security remediations, and vulnerability counts, vulnerabilities by deployments, and a vulnerability trend. Use this dashboard to gain insights into the effectiveness of your current vulnerability management efforts, learn about new vulnerabilities and emerging threats, help prioritize your remediation plans, and focus on specific areas in your environment. To learn more about this dashboard, see Vulnerability Summary Dashboard.

Automated Response Summary dashboard

The Automated Response Summary dashboard provides insight into your simple responses, a feature in Automated Response. Use this dashboard to determine the number of active and inactive simple responses in your customer account, approval status, simple responses that ran most recently, and the breakdown of simple responses by category. To learn more about this dashboard, see Automated Response Summary Dashboard.

Email Security Summary dashboard

The Email Security Summary dashboard provides security content collected from Mimecast logs for customers with a configured Mimecast collector. Use this dashboard to learn about recipients for malicious emails, of malware, and attachments, senders of malicious emails, of malware, and attachments, malware strains detected, malicious emails allowed , and Mimecast watchlist senders. To learn more about this dashboard, see Email Security Summary Dashboard.

Threat Risk Index (TRI) dashboard

The Threat Risk Index (TRI) Summary dashboard provides insights into the recent TRI scores of your environment, including the average TRI score and trends, vulnerabilities changes, last scanned asset changes, and TRI scores by assets. For more about how Alert Logic calculates TRI scores, see Threat Risk Index Score Factors. Use this dashboard to help you determine which of your deployments, VPCs, or networks are most exposed and susceptible to a security attack or breach. To learn more about this dashboard, see Threat Risk Index Summary.

Coverage and Health dashboard

The Coverage and Health dashboard provides insight into your entitlement usage and statuses in your environment, including an unprotected node count, a summary of your entitlement, node count and percentage usage, network and collection statuses, and open configuration exposures. Use this dashboard to improve network protection, fix configuration issues, and support optimization efforts in your environment. To learn more about this dashboard, see Coverage and Health Dashboard.

Endpoint Protection dashboard

The Endpoint Protection dashboard provides a summary of your endpoint activity, including protection statuses, version updates, last check-ins, and platforms, count of malware attacks detected, list of most attacked users and endpoints, top attack types, and blocked attacks and responses to attacks. Use this dashboard to gain insights into your endpoint activity, learn about attack patterns, and analyze the effectiveness of your current threat and incident management process. To learn more about this dashboard, see Endpoint Protection Dashboard.

The Endpoint Protection dashboard feeds from data in your Extended Endpoint Protection product. You must have an endpoint agent installed to a workstation or server to get value from this dashboard. To learn more about configuring Extended Endpoint Protection, see Get Started with Alert Logic Extended Endpoint Protection.

File Integrity Monitoring dashboard

The File Integrity Monitoring dashboard provides a summary of your file monitoring activity and issues found in your environment. Use this dashboard to gain insights into your file monitoring scope and status, focus your resources on specific systems or users that may need further investigation, and identify patterns or anomalies in your environment. To learn more about this dashboard, see File Integrity Monitoring Dashboard .

Web Log Analytics dashboard

The Web Log Analytics (WLA) dashboard provides visibility into threats, incidents, and observations detected from your WLA instance in your environment. Use this dashboard to gain insights into the types of incidents detected in your environment, analyze the effectiveness of your current incident response efforts, and learn about emerging threats. To learn more about this dashboard, see Web Log Analytics Dashboard.

Firewall Log Traffic dashboard

The Firewall Log Traffic Analysis dashboard provides insights into the firewall traffic connections found from analyzing firewall logs in your environment. Use this dashboard to identify the types of connections that were detected, trends that require further investigations, and learn about emerging threats. To learn more about this dashboard, see Firewall Log Traffic Analysis Dashboard.

Firewall Log Volume dashboard

The Firewall Log Volume Analysis dashboard provides insights into the volume of firewall log messages, firewall security incidents and observations in your environment. Use this dashboard to quickly identify patterns, trends and anomalies that require immediate response or further investigations. To learn more about this dashboard, see Firewall Log Volume Analysis Dashboard.

Firewall Log Security Analysis dashboard

The Firewall Log Security Analysis dashboard provides insights into the firewall security incidents generated from analyzing firewall logs in your environment. Use this dashboard to quickly identify the types of firewall incidents that were detected, analyze the effectiveness of your current firewall incident response efforts, and learn about emerging threats. To learn more about this dashboard, see Firewall Log Security Analysis Dashboard.

Authentication Management Summary dashboard

The Authentication Management Summary dashboard provides a summary of your authentication management application security incidents in your environment. Use this dashboard to gain insights into your management efforts of your authentication security incidents, and focus your resources on threats and anomalies in user login trends and activities in your environment. To learn more about this dashboard, see Authentication Management Summary.

Authentication Management Security dashboard

The Authentication Management Security dashboard provides a summary of your authentication security activity in your environment. Use this dashboard to gain insights into your user authentication attempts and login activity in your environment. To learn more about this dashboard, see Authentication Management Security.

Customize your dashboards

You can change the background color of your Dashboard. By default, your Dashboard is in Light Mode. To change the background of your Dashboard, click the color icon () on the top right, and then choose one of the following options:

  • Light Mode
  • Dark Mode
  • Blue Mode
  • Full Screen