Last update：2023-06-13 10:54:23
Enterprise Secure Access Dashboard provides the following benefits and enable you to:
Configuration Path: Login to Console and find ESA’s portal entry:
On this page, you will find quick view about:
High risk data only avalable on customers who are using Premium bundle and have Trust Engine feature configured.
It displays the security risk insight of devices, users and threat events.
|High risk /Total users||
High-risk users: The number of high-risk users within the query time. High-risk users refer to users whose trust level has been evaluated as high risk by the trusted engine.
Total users: The total number of users in the current enterprise.
|Unknow /Authorized /Total devices||
Unknown devices: The number of devices in the unauthorized device list.
Authorized devices: The number of devices in the authorized device list.
Total devices: The sum of unauthorized devices, authorized devices, and block listed devices.
|High risk/Total threats||
High-risk threats: The number of high-risk threats within the query time.
Total threats: The total number of threats within the query time.
It displays the access control insight of total policies, policies been enabled and hit.
|Hit count/Effective/Total policies||
Hit count: Total number of access control policies been hit during the query time.
Effective Policies: Number of access control policies currently enabled.
Total Policies: Total number of access control policies been defined
It displays the running status of security gateways, intranet lines, applications, users and user devices.
Security gateway: Total number of Security Gateways in the current enterprise
Abnormal security gateway: Number of Security Gateways with abnormal status in the current enterprise.
Intranet line: Total number of lines
Abnormal Intranet line: Number of lines with abnormal status
|Application||Total number of custom applications and SaaS applications been added|
|Online device||Number of devices online|
Online users: Number of users online
Total users: Total number of users in the organization structure
This report only available for customers who are using Premium bundle and have Device Compliance Check feature configured.
It displays the compliance check results of user access devices. IT administrators defines the items and policies to be checked on user devices. When user login to ESA, device information and behavior will be checked, logged and compared to policies pre-defined.
Effective policy: The number of policies enabled for device compliance checks
Total policies: The total number of policies for defined for compliance checks
|Pass Rate||The percentage of devices that passed device compliance checks during the query time|
It displays insight to traffic statistics of from users.
|Active User||Total number of users who logged in during the query period|
|Active Device||Total number of devices that logged in during the query period|
|Peak Online User||Peak number of concurrent users during the query period (hourly granularity)|
|Peak Online Device||Peak number of concurrent devices during the query period (hourly granularity)|
|Traffic||Total traffic of all users during the query period|
|Peak Bandwidth||Peak bandwidth of all users during the query period|
|Upstream||Total amount of client upload traffic during the query period|
|Downstream||Total amount of client download traffic during the query period|
It displays insight of function control policies, application control polices and the policies been hit.
Number of Function Control
Number of searches with hits and distribution of actions for functionality control during the query period
|Number of Application Control||Number of searches with hits and distribution of actions for application control during the query period|
|Number of Policy Hit||
Number of hits for functionality and application control during the query period
|Controlled User||Top 10 users with the highest hit number of function/application access control policies during the query period|
|Top 10 objects with the highest hit number of function/application access control policies during the query period|
Top 10 access control policies been hit during query time.
The query result can display by hit count or by controlled user
This report only available for customers who have purchased the value-added service called Network Traffic Analysis. We have pre-installed a large number of network threat events from our own threat intelligence or integrating with 3rd party intelligence. IT administrators can also self-defined threat events and define risk level. After that, ESA platform will monitor network traffics and logs to detect threat events. This report gives an overview of how many threat events have been detected, their security levels and the trend.
High Risk Event
Total number of high-risk events been recognized during query time
|Medium Risk Event||Total number of medium-risk events been recognized during query time|
|Low Risk Event||Total number of low-risk events been recognized during query time|
|Threat Event Type||The number and percentage of threat events been detected during the query time|
|Threat Event Trend||The trend of threat events been detected during the query time|