About the Application Visibility Page
To access this page, select Monitor > Applications > Visibility.
There are two ways in which you can view your application visibility data—Chart View or Grid View. By default, the data is displayed in Chart View.
Tasks You Can Perform
You can perform the following tasks from this page:
View application visibility data in Chart View. See Chart View.
View application visibility data in Grid View. See Grid View.
Select a device to which the application visibility settings are applicable. See Viewing Application or User Visibility Data for Specific Sites .
Click the Chart View link for a brief summary of the top 50 applications consuming the maximum bandwidth in your network. The data can be presented graphically as a bubble graph, heat map, or a zoomable bubble graph. The data is refreshed automatically based on the selected time range. You can also use the Custom button to set a custom time range.
You can hover over your applications to view critical information such as total number of sessions, total number of blocks, category, bandwidth consumed, risk levels, and characteristics. You can also view the top five users accessing your application.
Table 1 provides guidelines on using the fields on the Chart View of the Application Visibility page.
Table 1: Fields on the Chart View
Displays application visibility data for all the sites managed by CSO. Click Edit to select individual devices for which you want to view the data.
Select from the following options to view a user’s data:
Select the required time range to view a user’s data.
Use the custom option to choose the time range if you want to view data for more than one day. The time range is from 00:00 through 23:59.
Select from the following graphical representations to view an application’s data:
By default, data is shown in the Bubble Graph format.
Select from the following options to view the application’s data:
Number of Sessions
Displays the total number of application sessions.
Number of Blocks
Displays the total number of times the application was blocked.
Displays the bandwidth usage of the application.
Displays the risk associated with the application. For example, critical, high, unsafe, and so on.
Displays the category of the application. For example, web, infrastructure, and so on.
Displays the characteristics of the application. For example, prone to misuse, bandwidth consumer, capable of tunneling, and so on.
Click the Grid View link to obtain comprehensive details about applications. You can view top users by volume, top applications by volume, top category by volume, top characteristics by volume, and sessions by risk. You can also view the data in a tabular format that includes sortable columns. You can sort the applications in ascending or descending order based on application name, risk level, and so on. Table 2 describes the widgets in this view. Use these widgets to get an overall, high-level view of your applications, users, and the content traversing your network.
Table 2 provides guidelines on using the fields on the Grid View of the Application Visibility page.
Table 2: Widgets on the Grid View
Top Users By Volume
Top users of the application; sorted by bandwidth consumption.
Top Apps By Volume
Top applications using the network traffic, such as Amazon, Facebook, and so on, sorted by bandwidth consumption.
Top Category By Volume
The top category of the application, such as Web, infrastructure, and so on; sorted by bandwidth consumption.
Top Characteristics By Volume
Top behavioral characteristics of the application, such as whether it is highly prone to misuse, the top bandwidth consumer, and so on.
Sessions By Risk
Number of events or sessions received; grouped by risk.
Table 3 describes the fields in the table below the widgets. Users are displayed by usernames or IP addresses. When you click a link, the User Visibility page appears in a grid view, with the correct filter applied. Sessions are also displayed as links and when you click a link, the All Events page appears with all security events.
Table 3: Detailed View of Applications
Name of the application, such as Amazon, Facebook, and so on.
Risk associated with the application: critical, high, unsafe, moderate, low, and unknown.
Total number of users accessing the application.
Bandwidth used by the application.
Total number of application sessions.
No of Rejects
Total number of sessions blocked.
Category of the application, such as Web, infrastructure, and so on.
Subcategory of the application. For example, social networking, news, and advertisements.
Characteristics of the application. For example, prone to misuse, bandwidth consumer, capable of tunneling.