Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 

Policy Enforcer Dashboard Widgets

 

Policy enforcer adds widgets to the dashboard that provide a summary of all gathered information on compromised content and hosts. Drag and drop widgets to add them to your dashboard. Mouse over a widget to refresh, remove, or edit the contents.

In addition, you can use the dashboard to:

  • Navigate to the File Scanning page from the Top Scanned Files and Top Infected Files widgets by clicking the More Details link.

  • Navigate to the Hosts page from the Top Compromised Hosts widget by clicking the More Details link.

  • Navigate to the Command and Control Servers page from the C&C Server Malware Source Location widget.

Note

C&C and GeoIP filtering feeds are only available with the Cloud Feed or Premium license.

Available dashboard widgets are as follows:

Table 1: ATP Cloud Dashboard Widgets

Widget

Definition

Top Malware Identified

A list of the top malware found based on the number of times the malware is detected over a period of time. Use the arrow to filter by different time frames.

Top Compromised Hosts

A list of the top compromised hosts based on their associated threat level and blocked status.

Top Infected File Types

A graph of the top infected file types by file extension. Examples: exe, pdf, ini, zip. Use the arrows to filter by threat level and time frame.

Top Infected File Categories

A graph of the top infected file categories. Examples: executables, archived files, libraries. Use the arrows to filter by threat level and time frame.

Top Scanned File Types

A graph of the top file types scanned for malware. Examples: exe, pdf, ini, zip. Use the arrows to filter by different time frames.

Top Scanned File Categories

A graph of the top file categories scanned for malware. Examples: executables, archived files, libraries. Use the arrows to filter by different time frames.

C&C Server and Malware Source

A color-coded map displaying the location of Command and Control servers or other malware sources. Click a location on the map to view the number of detected sources.