Dashboard Parent topic

The dashboard indicates whether the network or IWSVA is performing normally, the amount of traffic or Internet usage is consistent and within the norm, and if there is unusual virus activity somewhere on the network. The IWSVA dashboard shows a summary of device group transactions that have occurred in the last 24 hours as well as one, two, 12, 24, and week-long increments.
Note
Note
Dashboard uses the time zone of the browser, not the time zone of IWSVA's location.
Dashboard
IWSVA provides dynamic displays where you can view the "real-time" statistics of the IWSVA server.
Also, above the left menu on every page, IWSVA provides a Search field where you can enter a feature name and be directed to the appropriate page for that feature.
Note
Note
Role-based access rights are not breached by the Search feature.
  • Top URL Categories Accessed - This widget shows URL category-related violations. Also, the time period displayed can show information for the last hour, day, week, or month. Users can refresh the data manually by clicking the Refresh icon in the upper right corner of the widget. The default display is bar-chart style, but it can be toggled to display in table format. To configure how many sources to be displayed, click the Edit icon beside the Refresh icon, and set the needed value in the pop-up window.
  • Top Users Blocked by Internet Security (default) - Shows which users access the most blocked sites for a specified range of time to help understand the user-awareness of Internet security and acceptable usage. Defaults: Top 5, Last 1 Day
  • Top URL Categories Blocked (default) - Shows the URL categories being blocked the most for a specified range of time to provide a high-level view of potential security, bandwidth, and productivity problems. Defaults: Top 5, Last 1 Day
  • Application Bandwidth (default) - Shows the traffic trend of bandwidth (kbps) by Application usage for a specified range of time. Default time period: Last 1 Day. This widget displays bandwidth in/out information based on IP addresses. Mouse-over a point on a colored line to display details for specific interfaces. Data is real-time data, but the widget itself also accumulates data. The average value calculation is based on the same time period from the previous day. For example, if the current value is 10:05, then the corresponding average value is calculated using the last seven days' values from the same time. You can refresh the data manually by clicking the Refresh Dashboard icon in the upper right corner of the page.
  • Top Blocked Applications - Shows the application categories being blocked the most for a specified range of time to provide a high-level view of potential security, bandwidth, and productivity problems. Defaults: Top 5, Last 1 Day
  • Payload - This is a dynamic display that can have two graphs: one for FTP and the other for HTTP(S). For FTP, the connection measured is the session for both commands and data. For HTTP(S), the connection measured is the session for both requests and responses. Default: Last 1 Day
  • Top Allowed Applications - Shows the total number of access instances for the top allowed applications within a specific period of time.
  • Top Threat Detection Count (default) - Shows the total count of different threat types (Malicious URLs, Virus, Spyware, Botnet, Exploit) detected by IWSVA for a specified range of time to provide a high-level view of the risk level of various threat vectors. Default: Last 1 Day
  • Top Policy Enforcement - Application Control - Shows which policies were violated by how many requests for a specified range of time to provide the effectiveness of policies and to identify needs to change. Defaults: Top 5, Last 1 Day
  • Top Policy Enforcement - URL Filtering - Shows which policies were violated by how many requests for a specified range of time to provide the effectiveness of policies and to identify needs to change. Defaults: Top 5, Last 1 Day
  • Top Policy Enforcement - DLP - Shows which policies were violated (block/monitor) by how many requests for a specified range of time to provide the effectiveness of policies and to identify needs to change.
  • C&C Callback Attempts (Command-and-Control Callback Attempts) - Shows C&C Callback Attempts noted within a specific period of time. Records only the last 200 log entries - not the total amount.
When mousing over the target component in the widget, corresponding numerical data-value displays. For example: when mousing over the Malicious-URLs bar on the "Total Threat Detection Count" widget, corresponding data-values are shown.
When clicking within a widget, the page is redirected to a log-query page that details the current widget setting parameters.
See also: