- Dashboards
- Navigation Overview
- View and Interact with Dashboards
- View and Interact with Visualizations
- User Management
- Configure and Manage Dashboards
- Create a Dashboard
- Add a Visualization to a Dashboard
- Add a Text Tile
- Modify a Dashboard Layout
- Add Dashboard Filters
- Manage Automatic Refresh Rates
- Create a Scheduled Delivery
- Make a Dashboard Public
- Export and Import Dashboards
- Edit Dashboard Filters
- Edit Dashboard Details
- Duplicate a Dashboard
- Delete a Dashboard
- Configure and Manage Visualizations
- Create a Visualization
- Auto-Create a Visualization from a Natural Language Prompt
- Create a Visualization from a Search Query
- Add Visualizations from the Library to a Dashboard
- Modify a Visualization
- Configure Visualization Query Filters
- Include Context Filtering in Visualizations
- Make a Visualization Public
- Export and Import Visualizations
- Duplicate a Visualization
- Remove a Visualization from a Dashboard
- Delete Visualizations from the Library
- Pre-Built Dashboards
- Advanced Analytics
- Threat Center
- Case Manager
- Compliance / Event Store
- Access Grant and Revoke Activity Dashboard
- Account Logout Summary Dashboard
- Account Management Activity Dashboard
- Application Security Event Summary Dashboard
- Authenticated User Accounts on Hosts Dashboard
- AWS CloudTrail Summary Dashboard
- Data Loss Prevention Activity Dashboard – Host-Based
- Data Loss Prevention Activity Dashboard – User-Based
- Data Loss Prevention Activity Summary Dashboard
- Default Account Access Dashboard
- Default Credential Usage and Change Activity Dashboard
- Denied Web Access Activity Dashboard
- Disabled User Account Summary Dashboard
- Discovered Attacks by Source and Destination Dashboard
- Endpoint Detection and Response Dashboard
- Failed Application Logon Activity Dashboard
- Failed Audit Logs Summary Dashboard
- Failed Host Login Attempt Counts by Users Dashboard
- Failed VPN Login Attempts and Remote Session Timeouts Dashboard
- Firewall Activity Dashboard
- Firewall and Router Device Interfaces Dashboard
- Indicator of Compromise (IOC) Statistics Dashboard
- Insecure Authentication Attempts Dashboard
- Microsoft 365 Summary Dashboard
- Microsoft Windows Overview Dashboard
- Network Applications by Traffic Volume Dashboard
- Policy Activity Summary Dashboard
- Port Usage Trends Dashboard
- Privileged Access Dashboard
- Privileged Access Dashboard – User-Based
- Protocols by Network Traffic Dashboard
- Remote Session Overview Dashboard
- Security Alert Summary Dashboard – Impacted Hosts
- Security Alert Summary Dashboard – Origin Hosts
- Security Alert Summary Dashboard – Users
- Successful Application Logon Activity Dashboard
- Successful Database Login Activity Dashboard
- Successful Physical Access Dashboard
- Top Attackers Dashboard
- User Account Creation Summary Dashboard
- User Account Lockout Activity Dashboard
- Vendor Authentication Activity Dashboard
- Windows Audit Failure Summary by Hosts Dashboard
- Windows Audit Failure Summary by Users Dashboard
- Windows User Privilege Elevation Dashboard
- Zscaler HTTP Dashboard
- Correlation Rules
- SOC Management
- Pre-Built Visualizations
- Anomalies - Use Case & MITRE Coverage
- Anomalies by Rule Name
- Anomalies by Use Case
- Anomalies Count Over Time
- Anomaly Distribution by MITRE Tactic & Score
- Application Count
- Closed Incidents
- Correlation Rules by Severity
- Correlation Rules Triggered Over Time
- Detected Anomalies
- Incidents Created
- Incident Summary by Incident Type
- SOC Incident Distribution
- Top Activities per Top 10 Applications
- Top Users per Top 10 Applications
- Trend of Application Security Events
Endpoint Detection and Response Dashboard
This dashboard provides an overview of key Endpoint Detection and Response (EDR) metrics and events, including the following: top EDR sources, top EDR users, EDR command line operations and processes, and EDR event trends.
Note
This dashboard can assist you in complying with the following regulatory requirements: NIST 800-53 SI-4, NIST 800-53 SI-3, TSC SOC2 CC6.8, NIST 800-53 MP-2.
Time Range Filter
The Event : Approx Log Time filter sets the time range for the event data. The default setting is in the last 7 days. You can update this filter with a wide range of customizable settings.
To update the time range filter, click the arrow () on the right, under the Edit button, to expand the filters panel. In the Event : Approx Log Time filter, select an operator from the first drop down menu and then enter or select values in the subsequent fields, depending on the operator you selected. To save your filter changes, click Apply on the right side of the filter panel. The updated filter is applied to the visualization.
Endpoint Events Count
This single value bar chart displays the total number of endpoint events within the selected time range.
Endpoint Event Trends
This line graph shows the count trends for endpoint events within the selected time range. To view the values represented in the chart, move your pointer over the graph line and hover on the data points. To view the underlying events of a value, click the data point, and then click Show Results in Search.
Command Line Count
This single value bar chart displays the total number of command line events within the selected time range.
Command Line Trends
This line graph shows the count trends for command line events within the selected time range. To view the values represented in the chart, move your pointer over the graph line and hover on the data points. To view the underlying events of a value, click the data point, and then click Show Results in Search.
Created Processes Count
This single value bar chart displays the total number of events generated from created processes.
Created Processes Trends
This line graph shows the count trends for events from created processes. To view the values represented in the chart, move your pointer over the graph line and hover on the data points. To view the underlying events of a value, click the data point, and then click Show Results in Search.
Network Processes Count
This single value bar chart displays the total number of events generated from network processes.
Network Processes Trends
This line graph shows the count trends for network process events over the selected time range. To view the values represented in the chart, move your pointer over the graph line and hover on the data points. To view the underlying events of a value, click the data point, and then click Show Results in Search.
Unique User Count
This single value bar chart displays the number of unique EDR users detected over the selected time range.
Unique User Trends
This line graph shows the count trends for unique EDR user events over the selected time range. To view the values represented in the chart, move your pointer over the graph line and hover on the data points. To view the underlying events of a value, click the data point, and then click Show Results in Search.
Top 10 Activity Types with EDR Events
This bar chart shows the top 10 activity types for EDR events during the selected time range. To view the values represented in the bars, hover your pointer over them. To view the underlying events of a value, click the bar, and then click Show Results in Search.
Top 10 Endpoint Commands
This pie chart illustrates the count proportions of the top 10 most common endpoint command line events. To view the represented values, hover your pointer over the graph slices. To view the underlying events of a value, click the graph slice, and then click Show Results in Search.
Top 10 Endpoint Sources
This table displays the counts for the top 10 most common endpoint source hosts. Click the heading of the column that you want to sort the data by. Click the arrow icon to change between ascending and descending orders.
Recent Endpoint Events
This table provides details on the last 20 endpoint events. Click the heading of the column that you want to sort the data by. Click the arrow icon to change between ascending and descending orders. To view all the table rows and columns, you may need to use the scroll bars on the right and at the bottom of the table.