The Security Center provides a centralized view for security filtering events. This includes both IDS/IPS and Advanced Malware Protection (AMP) events.
The Security Center provides information and insights to a network administrator through a variety of different components, each focusing on different analytics and uses. This section outlines each of those components and the information they present.
The top of the Security Center page allows control over the data being viewed. From this section of the page, it is possible to:
It is also possible to filter event data down to a single client or event. Clicking on a client, IP, or threat will pop up an info card that provides more information and links, including the ability to filter the Security Center view based on the item selected.
An example info card for an IDS/IPS signature is included below. Selecting Show only this signature will only show events related to that signature.
These filters will be displayed below the navigation and control panel and can be dismissed by clicking the X on the right-hand side:
It is possible to apply multiple filters. In the example above, events will be filtered by the IDS/IPS signature and the client device. Only events matching both filters are displayed in this case.
The summary view of the Security Center provides a variety of visual components to understand the security events on the network.
This component provides alerts about downloaded files that have changed to a malicious disposition.
Please see this article for more information about AMP dispositions and retrospection.
The Events over time component shows the number of events matching configured filters, over a specified interval of time, ranging from one month to two hours:
Clicking on a day will filter the data within the Security Center to display only events for the selected day.
This section provides a breakdown of the subset of clients that have generated the most events for the selected filters.
This section provides both a map and a table summary of the most common IP addresses associated with threats matching the configured filters.
The map provides a visual view into the trajectory of these threats, from the network location to the geo-located source of the IP address associated with the threat.
This component provides a list of the most frequent threats matching the selected filters. These can be the most common IDS/IPS signatures that have been detected, the most frequently scanned or blocked file through the AMP engine, or a combination of both.
This table summaries the events matching the selected filters by client operating system. The events are aggregated based on the operating system of the client devices in the security events and are displayed in the table by the number of events associated with that operating system.
The Events view provides the same data as the summary view in a text-based log. It is still possible to filter this data in the same ways as the summary view: