Dashboard Widgets Library
You can further customize your home page by adding or removing widgets. These widgets provide default dashboards, optimized for the type of data you want to view at-a-glance. You can access the library from your home page, click Edit > Add Widgets.
The following table lists each widget available in the library. A description is provided and an 'X' marks the features to which the widget is attributed. In addition, based on your privileges and role assignment, you may only see a subset of these widgets in your library. Finally, Malware and Malicious Sites must be turned on for your tenant, call Support to turn these features on for your tenant.
Widget | Risk Insights | Apps | Users | Devices | Incidents | Policies | Risk |
---|---|---|---|---|---|---|---|
Top Users | X | X | X | ||||
Top Apps | X | X | X | ||||
Top Device Types | X | X | X | ||||
Top Policy Hits | X | ||||||
Top Risky Users by User Confidence Index | X | X | X | X | |||
Watchlist | X | ||||||
Sanctioned Applications | X | X | |||||
Blocked Applications | X | X | |||||
Blocked Sites | X | ||||||
Apps by CCL | X | X | X | ||||
DLP Overview | X | ||||||
DLP Incidents | X | ||||||
Anomalies Overview | X | X | X | X | |||
Compromised Credentials Overview | X | X | |||||
Malware Overview | X | ||||||
Malicious Sites Overview | X | ||||||
Anomalies Top Users | X | X | X | ||||
Compromised Credentials Top Users | X | X | |||||
Malware | X | ||||||
Malicious Sites | X |
Widget | DLP | Malware | Malicious Sites | Compromised Credentials | Anomalies | Real-time Protection | API Data Protection |
---|---|---|---|---|---|---|---|
Top Users | |||||||
Top Apps | |||||||
Top Device Types | |||||||
Top Policy Hits | X | X | |||||
Top Risky Users by User Confidence Index | X | ||||||
Watchlist | |||||||
Sanctioned Applications | |||||||
Blocked Applications | |||||||
Blocked Sites | |||||||
Apps by CCL | |||||||
DLP Overview | X | X | |||||
DLP Incidents | X | X | |||||
Anomalies Overview | X | ||||||
Compromised Credentials Overview | X | ||||||
Malware Overview | X | X | |||||
Malicious Sites Overview | X | X | |||||
Anomalies Top Users | X | ||||||
Compromised Credentials Top Users | X | ||||||
Malware | X | X | |||||
Malicious Sites | X |
Use the Anomalies Overview widget to view the user anomalies in your organization:
view by total anomalies
users involved
top five profiles
risk level
time period
timestamp
Use the Applications by Cloud Confidence Index (CCI) widget to compare the usage of applications for different CCIs.in your organization:
view by categories
total bytes
Use the Blocked Applications widget to view the top blocked applications in your organization. You can also choose to view data by application or category. Drilling down takes you to the Skope IT page and shows alerts with:
blocked actions
view by categories
view by applications
traffic type cloud applications
sorted by timestamp
Use the Blocked Sites widget to view the top blocked sites in your organization. You can also choose to view data by category or sites. Drilling down takes you to the Skope IT page and shows alerts with:
blocked actions
view by categories
view by applications
sorted by timestamp
Use the Compromised Credentials Overview widget to view compromised user credentials in your organization:
view by number of users with compromised credentials
identified users
date last compromised
time period
timestamp
Use the Compromised Credentials Top Users widget to view the top users with the most compromised credentials in your organization:
view by user
number of compromises
data source: all data sources, active, AD Importer, CSV, API Data Protection, or log
time period
timestamp
Use the DLP Overview widget to view DLP incidents by application, instance, or file exposure:
view by applications (top 5)
policies (top 5)
instances
file exposure types: public, private, externally shared, internally shared, and enterprise shared
time period
status
Use the DLP Incidents widget to view the recent DLP incidents by policies, profiles, or rules:
view by DLP policy
DLP profiles
DLP rules
number of incidents
Use the Malicious Sites Overview widget to view the recent malicious sites accessed in your organization:
view by number of malicious sites allowed
number of users allowed
top five categories
risk level
time period
timestamp
Use the Malicious Sites widget to view the most severe malicious sites that were accessed recently in your organization:
view by site name
total number of users allowed
total number of users blocked
malicious site type
There are several malicious site types by which you can filter:
all types
ad fraud
botnet
command and control centers
compromised links to malware
hacking
malware call-home
malware distribution point
phishing / fraud
spam URLs
spyware and questionable software
C&C server
attack
phishing
malicious site
bot
phish site
spam
Use the Malware Overview widget to view the recently identified malware in your organization:
view by number of malware found
number of users affected
number of files affected
severity level
time period
timestamp
Use the Malware widget to view the most severe malware found recently in your organization:
view by policy name
malware type: virus, spyware, adware, dialer, or misleading application
total number of files affected
total number of users affected
application
Use the Policy Hits widget to view policy violations with the most matches in your organization:
view by all policies
Real-time Protection policies
API Data Protection policies
Use the Sanctioned Applications widget to view the percentage of applications that have the 'sanctioned' tag:
view by all categories
sorted by total bytes
Use the Top Apps widget to view top apps or categories viewed in your organization:
view by application or category type
total bytes
bytes uploaded
bytes downloaded
number of users
number of sessions
Use the Top Devices widget to view top device types in your organization:
view by all categories
total bytes
bytes uploaded
bytes downloaded
number of users
number of sessions
Use the Top Sites widget to view the top sites or categories visited. You can also choose to view data by category or sites and sort by a number of parameters. Drilling down takes you to the Skope IT > Sites page or Users list.
site
category
number of users
number of page visits
number of sessions
total bytes
bytes downloaded
bytes uploaded
Use the Top Users widget to view users in your organization:
view by a specific category
total bytes
bytes uploaded
bytes downloaded
Use the Top Users with Anomalies widget to view the users with the most anomalous incidents in your organization:
view by user
number of anomalies
all profiles
unusual usage
user behavior
shared credentials
data exfiltration
bulk upload of files
bulk files deleted
bulk download of files
failed log ins
rare event
risky countries
proximity event
time period
timestamp
Use the Top Risky Users by User Confidence Index widget to view the top risky users by User Confidence Index. You can filter the data to a User Confidence level.
Use the Watchlist widget monitors changes in the alert query:
view newest first
oldest first
most hits first