Seqrite Centralized Security Management gets the security related data from Seqrite Endpoint Security Cloud product on which all computer endpoints are registered and Seqrite mSuite on which the mobile devices are registered and managed and also from Data Privacy and Zero Trust.
Seqrite EndPoint Security Cloud and Seqrite EMM portals send the data to the Seqrite Centralized Security Management portal which consolidates and displays the corresponding data on its dashboard. The Dashboard area on the Seqrite Centralized Security Management console displays the count for all the endpoints (Computers and mobile devices) that are registered.
The Dashboard in the Centralized Security Management (CSM) portal serves as a comprehensive control center for monitoring and managing your organization's security posture. It provides real-time insights into key security metrics, helping administrators make informed decisions quickly.
Key Components
-
Header Section
- Displays the title "Centralized Security Management".
- Includes user account options such as the logged-in user profile (e.g., STI User, SU).
-
Navigation Panel
-
Located on the left side of the interface.
-
Provides quick access to various modules:
- Dashboard
- Admin Users
- End Users
- Manage: Endpoint Protection, Enterprise Mobility Management, Data Privacy (Try), SMAP, STI, Zero Trust, and XDR (Try)
-
-
Dashboard Summary Cards
- Endpoints: Total number of endpoints and those inactive for over 30 days.
- Mobiles: Total mobile devices and those inactive for over 30 days.
- Infections: Number of infected endpoints and mobiles.
- Violations: Count of policy and application violations.
-
Infection Status Chart
-
A bar chart visualizing infection trends over the past 7 days.
-
Displays:
- Total infected devices
- Infected endpoints
- Infected mobiles
-
-
Blocked Applications Accessed
- Highlights the top 5 users who attempted to access blocked applications.
- Visualized using a bar chart for quick comparison.
Endpoint Devices Summary
| Item | Description |
|---|---|
| Inactive Endpoints | Shows the number of inactive computers. An inactive computer is a registered computer that has not communicated with the Seqrite Centralized Security Management portal for the past few days. You can view the count for inactive computers over a period of 30 days or more, 15-29 days, 7-14 days, or 3-6 days, by clicking the corresponding button. On clicking the forward facing caret (>) a dialog box displays the list of inactive computers with computer name, IP Address, Group, and date and time of last sync. You can select the duration from the drop-down, search for a particular computer and view the information on corresponding pages. |
| Total Endpoints | Displays the total number of computers that have been registered with the Seqrite Centralized Security Management portal. |
Mobile Devices Summary
| Item | Description |
|---|---|
| Inactive Mobile devices | Displays the number of inactive mobile devices. An inactive mobile devices is a registered mobile devices that has not communicated with the Seqrite Centralized Security Management portal for the past few days. You can view the count for inactive mobile devices over a period of 30 days or more, 15-29 days, 7-14 days, or 3-6 days, by clicking the corresponding button. On clicking the forward facing caret, (>), a dialog box displays the list of mobile devices with mobile devices User name, Device Name, Mobile number, Group, and date and time of last sync. You can search for a particular mobile device and view the information on corresponding pages. |
| Total Mobile Devices | Displays the total number of mobile devices that have been registered with the Seqrite Centralized Security Management portal. |
Infection Status
The graph displays the count for endpoints on which infection is detected over the selected period. You can select a period of 3-6 days, 7-14 days, 15-29 days, or 30 days and more as required. Mobile devices are depicted by a yellow and computers by pink colored lines on the graph.
| Item | Description |
|---|---|
| Total Infected Endpoints | Indicates the number of the computers, and mobile devices on which infection is detected for the selected period of 3-6 days, 7-14 days, 15-29 days, or 30 days and more. |
| Infected Computers | Indicates the number of the computers on which infection is detected, for the selected period of 3-6 days, 7-14 days, 15-29 days, or 30 days and more. |
| Infected Mobiles | Indicates the number of the mobile devices on which infection is detected for the selected period of 3-6 days, 7-14 days, 15-29 days, or 30 days and more. |
Violations
Displays the count of violations for policy and applications for the selected period. You can select a period of 3-6 days, 7-14 days, 15-29 days, or 30 days or as required. The count for Policy or Application violations can be see by clicking the corresponding button.
Mobile devices are depicted by a yellow and computers by pink colored lines on the graph.
| Item | Description |
|---|---|
| Total Policy Violations | Indicates the total number of the policy violations that have occurred for both computers, and mobile devices for the selected period of 3-6 days, 7-14 days, 15-29 days, or 30 days and more. |
| Total Application Violations | Indicates the total number of the application violations that have occurred for both computers, and mobile devices for the selected period of 3-6 days, 7-14 days, 15-29 days, or 30 days and more. |
| Infected Computers | Indicates the count of Computers on which violations have occurred for selected type, whether policy or application for the selected period of 3-6 days, 7-14 days, 15-29 days, or 30 days and more. |
| Infected Mobiles | Indicates the count of Mobile devices on which violations have occurred for selected type, whether policy or application for the selected period of 3-6 days, 7-14 days, 15-29 days, or 30 days and more. |
Operating system and Agent version
This section displays the count of Operating Systems and versions of the client Agent installed. Click the corresponding button for Computers and Mobile Devices as required to view the details. The relative percentage for the various Operating Systems and Agent versions is depicted in different colors in the circular pie charts.
Top 10 Personal Data Classifiers
Data Privacy sends telemetry information about Personal Data Classifiers to Seqrite Centralized Security Management. On the dashboard, you can view progress bar charts that display top 10 Personal Data Classifiers data for last seven days. The Personal Data Classifiers are Email Address, Phone Number, Credit Card Number, Debit Card Number, Account Number, etc.
Top 5 Applications
Blocked Applications
Zero Trust sends telemetry information about blocked applications to Seqrite Centralized Security Management. On the dashboard, you can view progress bar charts that display top 5 Blocked Applications connection attempts for the last 30 days.
By Data Transfer
Zero Trust sends telemetry information about applications by data transfer to Seqrite Centralized Security Management.On the dashboard, you can view progress bar charts that shows last 30 days data of top 5 applications who consumes more data.
Top 5 Users
By Blocked Applications Accessed
Zero Trust sends telemetry information about users accessing blocked applications to Seqrite Centralized Security Management. On the dashboard, you can view progress bar charts that display top 5 users who attempted to access blocked applications for last 30 days.
By Data Transfer
Zero Trust sends telemetry information about users by data transfer to Seqrite Centralized Security Management.On the dashboard, you can view progress bar charts that shows last 30 days data of top 5 users which consumes more data while using applications.