The Alert Logic® Managed Detection and Response (MDR) console provides numerous dashboards and reports to help you analyze and track data for your deployments. Based on your role at your business, certain dashboards and reports may be more helpful and effective to meet your needs. This article provides recommendations for dashboards and reports to use based on general roles, as well as how often to run the reports. Your role may not exactly match the roles listed below; however, you can use this information as a guide to identify reports that may be useful.
Recommended Dashboards
Dashboards are located at navigation menu () > Dashboards. For more information on each dashboard, refer to our Dashboards Guide.
Dashboard Name |
Executive Manager |
CISO/Security |
Security Analysts |
IT Manager/ |
Managed Accounts Security Summary |
Y |
Y |
Y |
|
Managed Accounts Health Summary |
Y |
Y |
Y |
|
Threat Summary |
|
Y |
Y |
Y |
Vulnerability Summary |
|
Y |
Y |
Y |
TRI Summary |
|
Y |
Y |
Y |
Coverage and Health |
|
Y |
Y |
|
Endpoint Protection |
|
Y |
Y |
|
File Integrity Monitoring |
|
|
Y |
Y |
Web Log Analytics |
|
Y |
Y |
Y |
Firewall Log Volume Analysis |
|
|
|
Y |
Firewall Log Traffic Analysis |
|
|
|
Y |
Firewall Log Security Analysis |
|
Y |
Y |
|
Authentication Management Summary |
|
|
|
Y |
Authentication Management Security |
|
Y |
Y |
|
Recommended Reports
Reports are located at navigation menu () > Validate > Reports. For more information on each report, refer to our Reports Guide.
Report Name |
Executive Manager |
CISO/Security |
Security Analysts |
IT Manager/ |
Compliance/ |
Monthly Security Posture |
Monthly |
Monthly |
|
|
Quarterly |
Monthly Enterprise Risk |
|
Monthly |
|
|
|
Weekly Incident Analysis |
|
Weekly |
|
|
|
Incident Daily Digest Trends |
|
|
Weekly |
Weekly |
Quarterly |
Incident Target Explorer |
|
Monthly |
Weekly |
Weekly |
|
Incident Attacker Explorer |
|
Monthly |
Weekly |
Weekly |
|
Monthly Log Review Details |
|
|
Monthly |
|
|
WAF Violation Explorer |
|
|
Weekly |
|
|
WAF Violation Trends |
|
Monthly |
Monthly |
Monthly |
|
Weekly Vulnerability Analysis |
|
Weekly |
Weekly |
|
|
Current Vulnerable Host Breakdown |
|
|
|
Weekly |
|
Current Vulnerabilities Breakdown |
|
|
Weekly |
|
|
Last Scanned Breakdown |
|
Monthly |
Weekly |
Weekly |
Monthly |
Monthly Vulnerability Variance |
|
Monthly |
|
Monthly |
Monthly |
Weekly Vulnerability Variance |
|
|
Weekly |
|
|
Entitlement Summary |
|
Monthly |
Monthly |
|
|
Log Collection |
|
|
Weekly |
|
|
Top 10 Log Collection |
|
Monthly |
Monthly |
|
|
IDS Traffic |
|
|
Weekly |
|
|
Top 10 IDS Assets |
|
Monthly |
Monthly |
|
|
WAF Traffic |
|
|
Monthly |
Monthly |
|
Monthly Health Summary |
|
Monthly |
|
|
Monthly |
Weekly Health Summary |
|
|
Weekly |
|
|
SSL Certification Expiration Status |
|
|
Monthly |
|
|
Incident Notification Contacts |
|
Monthly |
|
|
Monthly |
Comments
0 comments
Please sign in to leave a comment.