Dashboard

Print Friendly, PDF & Email

Overview

On this page, the administrator can view comprehensive information about active user sessions on the user portal, registered devices, applications, and policies in the form of infographics. This helps the administrator get an overview over all the activities related to the organizational applications and services. The following information is displayed on this page.

Login Metrics

Two widgets display the total number of active sessions and the total number of registered devices on which the HawkkProtect Agent is installed.

Login Matrics Widget

Operating Systems

This widget shows the count of distinct operating systems (Windows, MAC, and Linux) identified on devices where the HawkkProtect Agent has been installed. This count is regardless of the duration filter set.

Operating Systems Widget

Device Status

This widget displays a doughnut chart that depicts the number of devices where the HawkkProtect Agent is installed. The chart categorizes the devices as either online or offline.

Device Status

Device Posture Status

This widget displays a doughnut chart that depicts the number of devices that meet device posture rules as Compliant and the number of devices that do not meet the rules as Non-Compliant.

Device Status

Blocked applications

Data transfer graphs dashboard 2.0

The widgets present the subsequent information.

Field Description
Total Total number of blocked applications.
Public Web Apps Number of blocked Public Web Apps.
Private Web Apps Number of blocked Private Web Apps.
Agent Based Apps Number of blocked Private Web Apps.
Graph The graphical representation of the number of connection attempts for the top 5 blocked applications is displayed.

Click View All to view the complete information about each of the blocked applications.

All blocked applications 1.1

Actions available with blocked applications

Field Description
Export To export these details in CSV format.
Manage Apps To manage these applications. Clicking this button redirects you to the applications page.

Users Accessing Blocked Applications

The widgets at the top display the following information.

Field Description
Total Total number of users accessing blocked applications.
Public web apps Number of users accessing blocked public web apps.
Private web apps Number of users accessing blocked private web apps.
Graph The graphical representation of the number of connection attempts for the top 5 users accessing the blocked applications is displayed.

Click View All to view the complete information about each user accessing the blocked applications as follows.

All users accessing blocked applications 1.1

Actions available with users accessing blocked applications

Field Description
Export To export these details in CSV format.
Manage Users To manage the users that are accessing the blocked applications. Clicking this button redirects you to the User Management page.

Applications by Data Transfer

Applications By Data Transfer Widget

In this chart, a widget at the top display the following information.

Field Description
Total Total number of applications.
Public Web Apps Number of public web apps.
Private Web Apps Number of private web apps.
Agent Based Apps Number of agent based apps.
Graph The graphical representation of the data transfer (In kilobytes) for the top 5 applications is displayed.

Click View All to view the complete information about the applications transmitting data.

View all top 5 applications by data transfer 1.1

Actions available with applications

Field Description
Export To export these details in CSV format.
Manage Apps To manage the applications. Clicking this button redirects you to the Application Catalog page.

Users Accessing Applications by Data Transfer

In this chart, a widget at the top display the following information.

Field Description
Total Total number of users accessing applications.
Public Web Apps Number of users accessing public web apps.
Private Web Apps Number of users accessing private web apps.
Agent Based apps Number of agent based apps.
Graph The graphical representation of the users transmitting data (In kilobytes) for the top 5 applications is displayed.

Click View All to view the complete information about the users accessing applications by transmitting data.

View all top 5 users accessing applications by data transfer 1.1

Actions available with users

Field Description
Export To export these details in CSV format.
Manage Users To manage the users. Clicking this button redirects you to the User Management page.

Policies Applied

Policies applied

In this section, the graphical representation of the top policies and the number of times they are applied is displayed.
Click View All to view complete information about all the applied policies.

All policies applied

Actions available with policies applied

Field Description
Export To export these details in CSV format.
Manage Policies To manage all the applied policies. Clicking this button will redirect you to the Policy Management page.

The administrator can view the information on this page for various time duration as required by clicking the View drop-down menu in the upper right corner. Now the time duration supports up to last 180 days, under the custom option available in the drop-down.

WAF

To enhance visibility and streamline monitoring of web application firewall (WAF) activity, a new filter has been added to the Dashboard page. This filter allows administrators to view connections that have been blocked for various reasons, including those blocked by the WAF, firewall, device posture check, and more.

A dedicated dashboard has been created to display widgets and statistics specifically related to WAF use-cases. This dedicated dashboard offers comprehensive insights into connections that are blocked but do not have user authentication policy enforced.

WAF Dashboard

Key Features of the Dedicated Dashboard

  • Widgets and Statistics

    The dedicated dashboard includes various widgets and statistical displays related to WAF use-cases.

  • Focus on Unauthenticated Connections

    The dashboard highlights connections that are blocked but do not have user authentication policy enforcement, allowing administrators to prioritize security measures.

Was this page helpful?