The dashboard indicates whether the network or IWSVA is performing normally, the amount
of traffic or Internet usage is consistent and within the norm, and if there is unusual
virus activity somewhere on the network. The IWSVA dashboard shows a summary of device
group transactions that have occurred in the last 24 hours as well as one, two, 12,
24, and week-long increments.
 |
Note
Dashboard uses the time zone of the browser, not the time zone of IWSVA's location.
|
Dashboard
IWSVA provides dynamic displays where you can view the "real-time" statistics of the
IWSVA server.
Also, above the left menu on every page, IWSVA provides a Search field where you can
enter a feature name and be directed to the appropriate page for that feature.
 |
Note
Role-based access rights are not breached by the Search feature.
|
-
Top URL Categories Accessed - This widget shows URL category-related violations. Also, the time period displayed
can show information for the last hour, day, week, or month. Users can refresh the
data manually by clicking the Refresh icon in the upper right corner of the widget. The default display is bar-chart style,
but it can be toggled to display in table format. To configure how many sources to
be displayed, click the Edit icon beside the Refresh icon, and set the needed value
in the pop-up window.
-
Top Users Blocked by Internet Security (default) - Shows which users access the most blocked sites for a specified range of time to
help understand the user-awareness of Internet security and acceptable usage. Defaults:
Top 5, Last 1 Day
-
Top URL Categories Blocked (default) - Shows the URL categories being blocked the most for a specified range of time to
provide a high-level view of potential security, bandwidth, and productivity problems.
Defaults: Top 5, Last 1 Day
-
Application Bandwidth (default) - Shows the traffic trend of bandwidth (kbps) by Application usage for a specified
range of time. Default time period: Last 1 Day. This widget displays bandwidth in/out
information based on IP addresses. Mouse-over a point on a colored line to display
details for specific interfaces. Data is real-time data, but the widget itself also
accumulates data. The average value calculation is based on the same time period from
the previous day. For example, if the current value is 10:05, then the corresponding
average value is calculated using the last seven days' values from the same time.
You can refresh the data manually by clicking the Refresh Dashboard icon in the upper right corner of the page.
-
Top Blocked Applications - Shows the application categories being blocked the most for a specified range of
time to provide a high-level view of potential security, bandwidth, and productivity
problems. Defaults: Top 5, Last 1 Day
-
Payload - This is a dynamic display that can have two graphs: one for FTP and the other for
HTTP(S). For FTP, the connection measured is the session for both commands and data.
For HTTP(S), the connection measured is the session for both requests and responses.
Default: Last 1 Day
-
Top Allowed Applications - Shows the total number of access instances for the top allowed applications within
a specific period of time.
-
Top Threat Detection Count (default) - Shows the total count of different threat types (Malicious URLs, Virus, Spyware,
Botnet, Exploit) detected by IWSVA for a specified range of time to provide a high-level
view of the risk level of various threat vectors. Default: Last 1 Day
-
Top Policy Enforcement - Application Control - Shows which policies were violated by how many requests for a specified range of
time to provide the effectiveness of policies and to identify needs to change. Defaults:
Top 5, Last 1 Day
-
Top Policy Enforcement - URL Filtering - Shows which policies were violated by how many requests for a specified range of
time to provide the effectiveness of policies and to identify needs to change. Defaults:
Top 5, Last 1 Day
-
Top Policy Enforcement - DLP - Shows which policies were violated (block/monitor) by how many requests for a specified
range of time to provide the effectiveness of policies and to identify needs to change.
-
C&C Callback Attempts (Command-and-Control Callback Attempts) - Shows C&C Callback Attempts noted within a specific period of time. Records only
the last 200 log entries - not the total amount.
When mousing over the target component in the widget, corresponding numerical data-value
displays. For example: when mousing over the Malicious-URLs bar on the "Total Threat
Detection Count" widget, corresponding data-values are shown.
When clicking within a widget, the page is redirected to a log-query page that details
the current widget setting parameters.
See also: