Dashboard Widgets Library
Dashboard Widgets Library
You can further customize your home page by adding or removing widgets. These widgets provide default dashboards, optimized for the type of data you want to view at-a-glance. You can access the library from your home page, click Edit > Add Widgets.
The following table lists each widget available in the library. A description is provided and an ‘X’ marks the features to which the widget is attributed. In addition, based on your privileges and role assignment, you may only see a subset of these widgets in your library. Finally, Malware and Malicious Sites must be turned on for your tenant, call Support to turn these features on for your tenant.
Widget | Risk Insights | Apps | Users | Devices | Incidents | Policies | Risk |
---|---|---|---|---|---|---|---|
Top Users | X | X | X | ||||
Top Apps | X | X | X | ||||
Top Device Types | X | X | X | ||||
Top Policy Hits | X | ||||||
Top Risky Users by User Confidence Index | X | X | X | X | |||
Watchlist | X | ||||||
Sanctioned Applications | X | X | |||||
Blocked Applications | X | X | |||||
Blocked Sites | X | ||||||
Apps by CCL | X | X | X | ||||
DLP Overview | X | ||||||
DLP Incidents | X | ||||||
Anomalies Overview | X | X | X | X | |||
Compromised Credentials Overview | X | X | |||||
Malware Overview | X | ||||||
Malicious Sites Overview | X | ||||||
Anomalies Top Users | X | X | X | ||||
Compromised Credentials Top Users | X | X | |||||
Malware | X | ||||||
Malicious Sites | X |
Widget | DLP | Malware | Malicious Sites | Compromised Credentials | Anomalies | Real-time Protection | API Data Protection |
---|---|---|---|---|---|---|---|
Top Users | |||||||
Top Apps | |||||||
Top Device Types | |||||||
Top Policy Hits | X | X | |||||
Top Risky Users by User Confidence Index | X | ||||||
Watchlist | |||||||
Sanctioned Applications | |||||||
Blocked Applications | |||||||
Blocked Sites | |||||||
Apps by CCL | |||||||
DLP Overview | X | X | |||||
DLP Incidents | X | X | |||||
Anomalies Overview | X | ||||||
Compromised Credentials Overview | X | ||||||
Malware Overview | X | X | |||||
Malicious Sites Overview | X | X | |||||
Anomalies Top Users | X | ||||||
Compromised Credentials Top Users | X | ||||||
Malware | X | X | |||||
Malicious Sites | X |
Use the Anomalies Overview widget to view the user anomalies in your organization:
- view by total anomalies
- users involved
- top five profiles
- risk level
- time period
- timestamp
Use the Applications by Cloud Confidence Index (CCI) widget to compare the usage of applications for different CCIs.in your organization:
- view by categories
- total bytes
Use the Blocked Applications widget to view the top blocked applications in your organization. You can also choose to view data by application or category. Drilling down takes you to the Skope IT page and shows alerts with:
- blocked actions
- view by categories
- view by applications
- traffic type cloud applications
- sorted by timestamp
Use the Blocked Sites widget to view the top blocked sites in your organization. You can also choose to view data by category or sites. Drilling down takes you to the Skope IT page and shows alerts with:
- blocked actions
- view by categories
- view by applications
- sorted by timestamp
Use the Compromised Credentials Overview widget to view compromised user credentials in your organization:
- view by number of users with compromised credentials
- identified users
- date last compromised
- time period
- timestamp
Use the Compromised Credentials Top Users widget to view the top users with the most compromised credentials in your organization:
- view by user
- number of compromises
- data source: all data sources, active, AD Importer, CSV, API Data Protection, or log
- time period
- timestamp
Use the DLP Overview widget to view DLP incidents by application, instance, or file exposure:
- view by applications (top 5)
- policies (top 5)
- instances
- file exposure types: public, private, externally shared, internally shared, and enterprise shared
- time period
- status
Use the DLP Incidents widget to view the recent DLP incidents by policies, profiles, or rules:
- view by DLP policy
- DLP profiles
- DLP rules
- number of incidents
Use the Malicious Sites Overview widget to view the recent malicious sites accessed in your organization:
- view by number of malicious sites allowed
- number of users allowed
- top five categories
- risk level
- time period
- timestamp
Use the Malicious Sites widget to view the most severe malicious sites that were accessed recently in your organization:
- view by site name
- total number of users allowed
- total number of users blocked
- malicious site type
There are several malicious site types by which you can filter:
- all types
- ad fraud
- botnet
- command and control centers
- compromised links to malware
- hacking
- malware call-home
- malware distribution point
- phishing / fraud
- spam URLs
- spyware and questionable software
- C&C server
- attack
- phishing
- malicious site
- bot
- phish site
- spam
Use the Malware Overview widget to view the recently identified malware in your organization:
- view by number of malware found
- number of users affected
- number of files affected
- severity level
- time period
- timestamp
Use the Malware widget to view the most severe malware found recently in your organization:
- view by policy name
- malware type: virus, spyware, adware, dialer, or misleading application
- total number of files affected
- total number of users affected
- application
Use the Policy Hits widget to view policy violations with the most matches in your organization:
- view by all policies
- Real-time Protection policies
- API Data Protection policies
Use the Sanctioned Applications widget to view the percentage of applications that have the ‘sanctioned’ tag:
- view by all categories
- sorted by total bytes
Use the Top Apps widget to view top apps or categories viewed in your organization:
- view by application or category type
- total bytes
- bytes uploaded
- bytes downloaded
- number of users
- number of sessions
Use the Top Devices widget to view top device types in your organization:
- view by all categories
- total bytes
- bytes uploaded
- bytes downloaded
- number of users
- number of sessions
Use the Top Sites widget to view the top sites or categories visited. You can also choose to view data by category or sites and sort by a number of parameters. Drilling down takes you to the Skope IT > Sites page or Users list.
- site
- category
- number of users
- number of page visits
- number of sessions
- total bytes
- bytes downloaded
- bytes uploaded
Use the Top Users widget to view users in your organization:
- view by a specific category
- total bytes
- bytes uploaded
- bytes downloaded
Use the Top Users with Anomalies widget to view the users with the most anomalous incidents in your organization:
- view by user
- number of anomalies
- all profiles
- unusual usage
- user behavior
- shared credentials
- data exfiltration
- bulk upload of files
- bulk files deleted
- bulk download of files
- failed log ins
- rare event
- risky countries
- proximity event
- time period
- timestamp
Use the Top Risky Users by User Confidence Index widget to view the top risky users by User Confidence Index. You can filter the data to a User Confidence level.
Use the Watchlist widget monitors changes in the alert query:
- view newest first
- oldest first
- most hits first