Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 24 Next »

Overview

The Workspace contains Dashboards, a collection of ISA widgets used to visualize data for detailed analysis.

The pre-defined Dashboards contains a set of ISA widgets. 

Dashboard 

 

 

The following widgets are included as part of the default Dashboard view:

External Data Sources:

List of external data sources that has been provided by the Customer. 

Enterprise Data Sources:

List of internal data sources that has been provided by the Customer. 

Threat Feed Ranking:

Threats ranked by CVEs (common vulnerabilities and exposures) and IOCs (indicator of compromise).

Vulnerability Matrix:

Provides count of vulnerable hosts per listed CVE.


For more information, see Dashboards Interface.

Choosing the Dashboard View

You can select the Dashboard view that corresponds to your organizational role.

To choose the dashboard view

  1. From the Workspace select default Dashboard, click on the "Choose your Dashboard view" dropdown.
  2. On the right side of the screen select CISCO or Cyber Analyst.

The data in the widgets is populated and displayed in a manner best suited to the selected role.

Widget Settings

You can configure the widget settings to specify the display behavior of the widgets.

To configure the widget settings:

  1. From the Global Workspace default Dashboard, click on the widget settings gear graphic. 
  2. Select from the options described below

Frequency:

Daily, Weekly and Monthly frequencies are selectable from the widgets.

Source/Feed:

Place a checkmark next to the available data sources for analysis.

CISO Dashboard Widgets

The CISO Breach Detection Dashboard provides a view across your enterprise. This widget differs from the Analyst Dashboard Widgets by offering more detailed visibility across Business Units and Risk Scores. This provides a more meaningful and organized view of risk to transition quickly to the business units with the largest challenges. 

The Risk Score is developed upon setup of ISA and represents a combination of asset type, criticality and value.  

In addition to Breach Detection the Threat Feed Prioritization widget also provides an additional layer of visibility across the 

 

 

In this section:

 

  • No labels