Dashboard

Print Friendly, PDF & Email

Seqrite Centralized Security Management gets the security related data from Seqrite Endpoint Security Cloud product on which all computer endpoints are registered and Seqrite mSuite on which the mobile devices are registered and managed and also from Data Privacy and ZTNA.

Seqrite EndPoint Security Cloud and Seqrite mSuite portals send the data to the Seqrite Centralized Security Management portal which consolidates and displays the corresponding data on its dashboard. The Dashboard area on the Seqrite Centralized Security Management console displays the count for all the endpoints (Computers and mobile devices) that are registered.

The Seqrite Centralized Security Management dashboard depicts the count for endpoints on which infection is detected with the breakup for computers and mobiles separately. A count of endpoints on which infection is detected over a period of last 3-6 days, 7-14, days, 15-29 days, or more than 30 days is displayed.

Violations for applications and policies on separate tabs for a period of 3-6 days, 7-14 days, 15-29 days, or more than 30 days is displayed. A breakup of the count of policy violations for computers and mobile devices is also displayed. Hover on the graph to view more information related to that day.

The dashboard also displays a navigation pane on the left side that allows the user to navigate to other pages of Seqrite Centralized Security Management.

Item Description
Inactive Computers Shows the number of inactive computers. An inactive computer is a registered computer that has not communicated with the Seqrite Centralized Security Management portal for the past few days. You can view the count for inactive computers over a period of 30 days or more, 15-29 days, 7-14 days, or 3-6 days, by clicking the corresponding button. On clicking the forward facing caret (>) a dialog box displays the list of inactive computers with computer name, IP Address, Group, and date and time of last sync. You can select the duration from the drop-down, search for a particular computer and view the information on corresponding pages.
Total Computers Displays the total number of computers that have been registered with the Seqrite Centralized Security Management portal.

Mobile Devices Summary

Item Description
Inactive Mobile devices Displays the number of inactive mobile devices. An inactive mobile devices is a registered mobile devices that has not communicated with the Seqrite Centralized Security Management portal for the past few days. You can view the count for inactive mobile devices over a period of 30 days or more, 15-29 days, 7-14 days, or 3-6 days, by clicking the corresponding button. On clicking the forward facing caret, (>), a dialog box displays the list of mobile devices with mobile devices User name, Device Name, Mobile number, Group, and date and time of last sync. You can search for a particular mobile device and view the information on corresponding pages.
Total Mobile Devices Displays the total number of mobile devices that have been registered with the Seqrite Centralized Security Management portal.

Infection Status

The graph displays the count for endpoints on which infection is detected over the selected period. You can select a period of 3-6 days, 7-14 days, 15-29 days, or 30 days and more as required. Mobile devices are depicted by a yellow and computers by pink colored lines on the graph.

Item Description
Total Infected Endpoints Indicates the number of the computers, and mobile devices on which infection is detected for the selected period of 3-6 days, 7-14 days, 15-29 days, or 30 days and more.
Infected Computers Indicates the number of the computers on which infection is detected, for the selected period of 3-6 days, 7-14 days, 15-29 days, or 30 days and more.
Infected Mobiles Indicates the number of the mobile devices on which infection is detected for the selected period of 3-6 days, 7-14 days, 15-29 days, or 30 days and more.

Violations

Displays the count of violations for policy and applications for the selected period. You can select a period of 3-6 days, 7-14 days, 15-29 days, or 30 days or as required. The count for Policy or Application violations can be see by clicking the corresponding button.
Mobile devices are depicted by a yellow and computers by pink colored lines on the graph.

Item Description
Total Policy Violations Indicates the total number of the policy violations that have occurred for both computers, and mobile devices for the selected period of 3-6 days, 7-14 days, 15-29 days, or 30 days and more.
Total Application Violations Indicates the total number of the application violations that have occurred for both computers, and mobile devices for the selected period of 3-6 days, 7-14 days, 15-29 days, or 30 days and more.
Infected Computers Indicates the count of Computers on which violations have occurred for selected type, whether policy or application for the selected period of 3-6 days, 7-14 days, 15-29 days, or 30 days and more.
Infected Mobiles Indicates the count of Mobile devices on which violations have occurred for selected type, whether policy or application for the selected period of 3-6 days, 7-14 days, 15-29 days, or 30 days and more.

Operating system and Agent version

This section displays the count of Operating Systems and versions of the client Agent installed. Click the corresponding button for Computers and Mobile Devices as required to view the details. The relative percentage for the various Operating Systems and Agent versions is depicted in different colors in the circular pie charts.

Top 10 Personal Data Classifiers

Data Privacy sends telemetry information about Personal Data Classifiers to Seqrite Centralized Security Management. On the dashboard, you can view progress bar charts that display top 10 Personal Data Classifiers data for last seven days. The Personal Data Classifiers are Email Address, Phone Number, Credit Card Number, Debit Card Number, Account Number, etc.

Top 5 Applications

Blocked Applications

ZTNA sends telemetry information about blocked applications to Seqrite Centralized Security Management. On the dashboard, you can view progress bar charts that display top 5 Blocked Applications connection attempts for the last 30 days.

By Data Transfer

ZTNA sends telemetry information about applications by data transfer to Seqrite Centralized Security Management.On the dashboard, you can view progress bar charts that shows last 30 days data of top 5 applications who consumes more data.

Top 5 Users

By Blocked Applications Accessed

ZTNA sends telemetry information about users accessing blocked applications to Seqrite Centralized Security Management. On the dashboard, you can view progress bar charts that display top 5 users who attempted to access blocked applications for last 30 days.

By Data Transfer

ZTNA sends telemetry information about users by data transfer to Seqrite Centralized Security Management.On the dashboard, you can view progress bar charts that shows last 30 days data of top 5 users which consumes more data while using applications.

Was this page helpful?

Leave a Comment