This dashboard provides an administrative overview of Tenable Applications, and highlights potential problems. These eight components provide indications to common problems, and allow the administrator to quickly take action to resolve concerns, and to minimize the potential loss of vulnerability or event data.
This dashboard contains a series of components that provide an analysis of collected events over time.
This dashboard presents trust relationships between clients and servers that have been passively gathered via PVS plugins 3 and 15. These plugins collect data on internal client trusted client connections and internal server trusted connections. Results are sorted by TCP port and displayed in a series of matrix indicators within the individual components. Viewing plugin output provides insight into devices that are establishing trusted connections to each other.
This dashboard is a series of components that provide basic analysis of Fortigate devices.
The top three components offer trending data in regard to allowed connections, blocked connections, and sessions that have timed out. This easy to read graph can alert the analyst to potential connection-based anomalies.
The Data Events component displays the total number of TCP, UDP, and ICMP allowed/blocked connections over the last 24 hours.
This component presents a detailed vulnerability summary on files that may contain copyrighted materials, such as commercial movies or music files, that are being shared without the owner's permission. If any of these files actually contain copyrighted material, and if they are freely swapped around, your organization might be held liable for copyright infringement by associations such as the RIAA or the MPAA.
The associated report can be found here: Copyright Report