Views:

This section of the Security Posture tab provides information about the antivirus pattern compliance level or the Data Loss Prevention compliance level of your network.

As your network compliance level changes, the color of the compliance indicator icon changes to reflect the thresholds configured on the Active Directory and Compliance Settings screen.

The default view displays information for the Antivirus pattern compliance indicator.

Note:

Changing the compliance indicator also changes the compliance level information that displays in the Security Posture chart.

For more information, see Security Posture Chart.

To change the compliance information that displays, click the name of the selected compliance indicator next to the down arrow icon () and select one of the following indicators from the drop-down.

Indicator

Description

Antivirus pattern compliance

Displays the following information:

  • The percentage of Security Agents using acceptable Virus Pattern and Smart Scan Agent Pattern versions

    Note:

    Apex Central supports Security Agents for the following managed products:

    • Apex One

    • Worry-Free Business Security Services

    For more information about configuring compliance indicator settings, see Configuring the Antivirus Pattern Compliance Indicators.

  • The total number of endpoints with outdated antivirus patterns on your network

    Click the count for Endpoints with outdated patterns to view detailed information about the affected endpoints in the User/Endpoint Directory.

    For more information, see User/Endpoint Directory.

Data Loss Prevention compliance

Displays the following information:

  • The percentage of Data Loss Prevention enabled Security Agents with an acceptable number of threat detections

    For more information about configuring compliance indicator settings, see Configuring the Data Loss Prevention Compliance Indicator.

  • The total number of endpoints with Data Discovery threat detections

    Click the count for Endpoints with unacceptable threat detections to view detailed information about the affected endpoints in the User/Endpoint Directory.

    For more information, see User/Endpoint Directory.