Key features of Aurora Endpoint Security dashboards

Dashboard

Features

Device Protection (Aurora Protect Desktop)

  • Running Threats: View the count of threats that are currently running on devices.
  • Auto-Run Threats: View the count of threats that are set to run automatically.
  • Quarantined Threats: View the count of quarantined threats.
  • Unique to Cylance: View the count of threats that have been uniquely identified by Aurora Protect Desktop.
  • Total Files Analyzed: View a count of the total number of files analyzed by Aurora Protect Desktop.
  • Threat Events: View the threats detected over the last 30 days, classified by unsafe, abnormal, quarantined, waived, and cleared.
  • Threat Protection: View the percentage of threats on which you have taken action (for example, quarantine, waive, or added to the safe list).
  • Device Protection: View the percentage of devices with both unsafe and abnormal files configured for auto-quarantine in device policies. If auto-quarantine is disabled for one or both file types, the device is considered unprotected when calculating the percentage.
  • Threats By Priority: View the total number of threats, grouped by priority, that have not yet been acted on and require attention.
  • Threat Classifications: View a heat map of the types of threats detected.
  • Top Ten Lists: View the top ten threats found on the most devices, the top ten devices with the most threats, and the top ten zones with the most threats.

Mobile Protection (Aurora Protect Mobile)

  • Mobile Alerts Detected: View the count of mobile alerts that are detected and the count of mobile alerts that are unresolved.
  • Mobile Devices with Alerts: View the count of mobile devices with alerts detected by the Aurora Protect Mobile app.
  • Mobile Devices Enabled for Alerts Detection: View the count of mobile devices with the Aurora Protect Mobile app installed and activated.
  • Mobile Alerts by Category: View charts and graphs of mobile alerts by category.
  • Mobile OSs with Vulnerabilities: View a graph of mobile operating systems with vulnerabilities, as identified, defined, and tracked by the National Vulnerability Database.
  • Mobile App Alerts: View statistics for detected malicious and sideloaded apps.
  • Mobile Network Alerts: View statistics for unsafe network and insecure Wi-Fi detections.
  • Mobile Device Security Alerts: View statistics for device security detections (screen lock disabled, attestation failure, and so on).
  • View lists and statistics for the top threats in the following categories:
    • Top Devices with Mobile Alerts
    • Top Insecure Wi-Fi Networks
    • Top Malicious Apps
    • Top Mobile Alert Detections
    • Top Sideloaded Apps
    • Top Unsafe Message URLs
    • Top Unsafe Networks
    • Top Unsupported Device Models
    • Top Unsupported OSs
    • Top Unsupported Security Patches

Network (Gateway)

  • Total Active Gateway Users: View the count of active users.
  • Network Connections: View a chart of allowed and blocked network connections.
  • Transferred Bytes: View a chart of transferred bytes (uploaded and downloaded).
  • Private Network Access, Public Network Access: View graphs of private and public network access.
  • Private Top Network Destinations, Public Top Network Destinations: View lists of the top private and public network destinations and top actions.
  • Connector Connection History: View a graph of online and offline Gateway Connectors.
  • Connector Status: View the connection status of the Gateway Connectors in your environment.
  • Destination Reputation Risk: View a list of low, medium, and high destination risk alerts.
  • Security Risk Categories: View the allowed, blocked, and combination of allowed and blocked risk categories for a specified category.
  • TLS Versions: View a chart of TLS versions in your environment.
  • Top Blocked Categories: View a graph of allowed, blocked, and combination of allowed and blocked destinations for the specified destination risk level.
  • Top Bandwidth Consumers: View a list of top bandwidth consumers in public, private, and combined public and private paths.

Information protection (CylanceAVERT)

  • Information Exfiltration Events: View the count of CylanceAVERT exfiltration events, grouped by exfiltration type. This widget can be filtered by a custom time.
  • Top 10 Exfiltration Events by Category: View the count of the top 10 exfiltration events by category (policies, users, devices, files, and data types). This widget can be filtered by a custom time.
  • Top 10 File Inventory Items by Category: View the count of the top 10 inventory items by category (policies, file extensions, info types, and data types).
  • Top 10 Exfiltration Events by Location:  View the count of the top 10 exfiltration events by location (web domains, email domains, and removable media). This widget can be filtered by a custom time.
  • File Inventory: View the count of sensitive files in the file inventory.
  • Evidence Locker: View the count of sensitive files in the evidence locker.
  • Total Active CylanceAVERT Users: View the count of total connected CylanceAVERT users.
  • Total Active CylanceAVERT Devices: View the count of total connected CylanceAVERT devices.