|
Device Protection (Aurora Protect Desktop) |
- Running Threats: View the count of threats that are currently running on devices.
- Auto-Run Threats: View the count of threats that are set to run automatically.
- Quarantined Threats: View the count of quarantined threats.
- Unique to Cylance: View the count of threats that have been uniquely identified by Aurora Protect Desktop.
- Total Files Analyzed: View a count of the total number of files analyzed by Aurora Protect Desktop.
- Threat Events: View the threats detected over the last 30 days, classified by unsafe, abnormal, quarantined, waived, and cleared.
- Threat Protection: View the percentage of threats on which you have taken action (for example, quarantine, waive, or added to the safe list).
- Device Protection: View the percentage of devices with both unsafe and abnormal files configured for auto-quarantine in device policies. If auto-quarantine is disabled for one or both file types, the device is considered unprotected when calculating the percentage.
- Threats By Priority: View the total number of threats, grouped by priority, that have not yet been acted on and require attention.
- Threat Classifications: View a heat map of the types of threats detected.
- Top Ten Lists: View the top ten threats found on the most devices, the top ten devices with the most threats, and the top ten zones with the most threats.
|
|
Mobile Protection (Aurora Protect Mobile) |
- Mobile Alerts Detected: View the count of mobile alerts that are detected and the count of mobile alerts that are unresolved.
- Mobile Devices with Alerts: View the count of mobile devices with alerts detected by the Aurora Protect Mobile app.
- Mobile Devices Enabled for Alerts Detection: View the count of mobile devices with the Aurora Protect Mobile app installed and activated.
- Mobile Alerts by Category: View charts and graphs of mobile alerts by category.
- Mobile OSs with Vulnerabilities: View a graph of mobile operating systems with vulnerabilities, as identified, defined, and tracked by the National Vulnerability Database.
- Mobile App Alerts: View statistics for detected malicious and sideloaded apps.
- Mobile Network Alerts: View statistics for unsafe network and insecure Wi-Fi detections.
- Mobile Device Security Alerts: View statistics for device security detections (screen lock disabled, attestation failure, and so on).
- View lists and statistics for the top threats in the following categories:
- Top Devices with Mobile Alerts
- Top Insecure Wi-Fi Networks
- Top Malicious Apps
- Top Mobile Alert Detections
- Top Sideloaded Apps
- Top Unsafe Message URLs
- Top Unsafe Networks
- Top Unsupported Device Models
- Top Unsupported OSs
- Top Unsupported Security Patches
|
|
Network (Gateway) |
- Total Active Gateway Users: View the count of active users.
- Network Connections: View a chart of allowed and blocked network connections.
- Transferred Bytes: View a chart of transferred bytes (uploaded and downloaded).
- Private Network Access, Public Network Access: View graphs of private and public network access.
- Private Top Network Destinations, Public Top Network Destinations: View lists of the top private and public network destinations and top actions.
- Connector Connection History: View a graph of online and offline Gateway Connectors.
- Connector Status: View the connection status of the Gateway Connectors in your environment.
- Destination Reputation Risk: View a list of low, medium, and high destination risk alerts.
- Security Risk Categories: View the allowed, blocked, and combination of allowed and blocked risk categories for a specified category.
- TLS Versions: View a chart of TLS versions in your environment.
- Top Blocked Categories: View a graph of allowed, blocked, and combination of allowed and blocked destinations for the specified destination risk level.
- Top Bandwidth Consumers: View a list of top bandwidth consumers in public, private, and combined public and private paths.
|
|
Information protection (CylanceAVERT) |
- Information Exfiltration Events: View the count of CylanceAVERT exfiltration events, grouped by exfiltration type. This widget can be filtered by a custom time.
- Top 10 Exfiltration Events by Category: View the count of the top 10 exfiltration events by category (policies, users, devices, files, and data types). This widget can be filtered by a custom time.
- Top 10 File Inventory Items by Category: View the count of the top 10 inventory items by category (policies, file extensions, info types, and data types).
- Top 10 Exfiltration Events by Location: View the count of the top 10 exfiltration events by location (web domains, email domains, and removable media). This widget can be filtered by a custom time.
- File Inventory: View the count of sensitive files in the file inventory.
- Evidence Locker: View the count of sensitive files in the evidence locker.
- Total Active CylanceAVERT Users: View the count of total connected CylanceAVERT users.
- Total Active CylanceAVERT Devices: View the count of total connected CylanceAVERT devices.
|