use_widgets
Each widget provides targeted security-related information. Widgets can display this information in one of the following ways:
Bar graph
Pie chart
Line graph
Table
Click the help icon on a widget to view the following types of information:
Widget Help |
Widget Topic |
Description |
Overview |
Provides a description for the widget and how the widget can be used |
Widget Data |
Detailed information about the data that displays in the widget’s table |
Configure |
Description of settings that are readily visible on the widget |
Edit |
Description of settings that require clicking the edit icon to modify |
Detailed Widget Information
Displaying widget data in a table provides an added benefit to users. The data in some columns can be clicked to view detailed information.
Example: From the Control Manager Top Threats widget on the Threat Statistics tab, clicking any link from the Detections column opens to a table with the following information:
Widget drill-down example |
Data |
Description |
Endpoint |
Host name for the endpoint with a virus |
Product |
Name of the product that detected the virus |
Virus |
Name of the virus |
Start time |
Time of first detection of the virus |
End time |
Time of the last detection of the virus |
Detections |
Number of virus detections |
Widget List
The following table lists widgets available on the dashboard.
On parent Control Manager servers,
the Control Manager Top Threats
and File Reputation Top Threat Detections
widgets require scheduled log updates from child Control Manager servers,
to display accurate data.
To enable scheduled log uploads from child Control Manager servers:
Products > Select a child server from the Product Directory
> Configure > Schedule Child Control
Manager server log uploads
Control Manager Widget List |
Widget |
Purpose |
Threat Detection Results |
Use this widget to track which endpoints or managed products need further action from administrators. Example: You want to know which endpoints or managed products have viruses that could not be cleaned, deleted, or quarantined. |
Policy Violation Detections |
Use this widget to track Network VirusWall Enforcer service violations. |
Product Component Status |
Use this widget to track managed products or endpoints with out of date components. Example: You want to know which endpoints with OfficeScan clients do not have the latest version of the Virus Pattern File. |
Control Manager Top Threats |
Use this widget to track the top malicious files detected or malicious URLs your endpoints access across your network. Example: You want to know the top malicious URLs detected by a specific segment of your network. |
Control Manager Threat Statistics |
Use this widget to check the total number of security threat detections on your network. Data can be filtered by security threat type or by the location on your network where the threat is detected. Example 1: You want to know the total number of virus detections across your network. Example 2: You want to know the total number of security threat detections from file servers on your network. |
Smart Protection Network Threat Statistics |
Use this widget as a reference for security threat detections on your network, globally, and globally within an industry. |
Product Application Compliance |
Use this widget to track which managed product's applications are not up to date. Example: You want to know which OfficeScan 10 servers are not within three build releases of the latest version of OfficeScan 10. |
Product Connection Status |
Use this widget to track which managed products are offline, disabled, or that have an abnormal connection to Control Manager. |
OfficeScan Endpoint Connection Status |
Use this widget to track OfficeScan clients that are offline or roaming. |
File Reputation Top Threat Detections |
Use this widget as a reference between the top threats globally and the threats on your network. |
Web Reputation Top Threat Sources |
Use this widget as a reference for global trends in malicious URLs. |
Smart Protection Network Connections |
Use this widget to track the number of endpoints that connect to the Smart Protection Network. |
File Reputation Threat Map |
Use this widget as a reference for global trends in malicious files. |
Email Reputation Threat Map |
Use this widget as a reference for global trends in spam. |
Web Reputation Top Threatened Users |
Use this widget as a reference for global trends in malicious URLs. |
See also: