Skip to main content

The Risk Management Dashboard

The Risk Management page provides an overview of your network security and risk assessment information.

Important

When you access the Dashboard for the first time you will be prompted with a notification bar that requires your permission to allow GravityZone to monitor unusual user activity.

UserMonitoringActivation.png

Note

See User Behavior Risk Data Collection for more details on how we process user data.

Company Risk Score

The overall risk score displays the level of risk your organization is exposed to by misconfigured system settings, known vulnerabilities of currently installed applications, and potential risks caused by user activity and behavior.

The score represents an average of the three major risk categories: Misconfiguration, App Vulnerabilities, and Human Risks, and it is adjusted using the Health Industry Modifier.

iorCompanyRiskScoreWidget.png

Click the widget and a details panel will open where you can see details of how the overall risk is being calculated and broken down into subcategories.

iorCompanyRiskScorePanel.png

Note

Running an on-demand Risk Scan on a new target device will influence the overall score. The results will be kept for 90 days, or until the next scan.

Health Industry Modifier

The Health Industry Modifier dynamically adjusts the company score based on common vulnerabilities and exposures (CVEs) discovered in your environment, which have already been exploited at industry level.

iorHealthModifier.png

Score Over Time

This widget is a histogram that displays the weekly evolution of the number of affected devices detected as vulnerable after risk scans. The histogram data represents the number of devices affected by risk indicators from the last seven days, until 12 AM (server time) of the current day.

iorScoreOverTime.png

Top Misconfigurations

This widget displays the top 15 results for indicators that triggered a risk alert after scanning the devices, ordered by the number of affected devices. Each card represents one indicator that has triggered a risk alert for at least one device.

iorTopMisconfigurations.png

Each card displays the following elements:

  • The indicator's name

  • The number of devices detected as vulnerable for this indicator

  • The severity for the current indicator of risk

If you click the individual indicator widget it will open the selected indicator of risk in the Misconfigurations tab of the Security Risks page, where you may take appropriate actions to mitigate this risk.

If you click the View All button you will view the entire list of discovered misconfigurations in the Misconfigurations tab of the Security Risks page.

Note

For more details on misconfigurations, refer to GravityZone Indicators of Risk.

Top Vulnerable Apps

This widget displays the top 15 results for known application vulnerabilities that triggered a risk alert after scanning the devices, ordered by the number of affected devices. Each card represents one vulnerable application that raised a risk alert for at least one device.

iorTopVulnerableApps.png

Each card displays the following elements:

  • The application's name.

  • The number of devices made vulnerable by this application.

  • The severity for the vulnerable application.

If you click the individual app widget it will open the selected vulnerability in the App Vulnerabilities tab of the Security Risks page, where you may take appropriate actions to mitigate this risk.

If you click the View All button you will view the entire list of discovered application vulnerabilities in the App Vulnerabilities tab of the Security Risks page.

Note

You can find details about known application vulnerabilities on the CVE Details website.

Top User Behavior Risks

This widget displays the top 15 results for potential risks caused by unintentional or reckless behavior of users active in your network, ordered by the number of vulnerable users. Each card represents a human based risk caused by at least one user.

iorTopUserBehaviorRisks.png

If you click the individual human risk widget it will open the selected risk in the User Behavior Risks tab of the Security Risks page, where you may view and analyze it in more detail.

If you click the View All button you will view the entire list of all the discovered human risks generated by user activity in the User Behavior Risks tab of the Security Risks page.

Note

This new ERA feature is available as a preview version, enabling you only to view human-based risks, and to ignore them if they are irrelevant to your environment. More enhanced functionality will be added in the coming future.

Note

See User Behavior Risk Data Collection for more details on how we process user data.

Servers by Severity

This widget shows the severity of the risks threatening the servers in your environment.

iorServersBySeverity.png

The impact of the discovered misconfigurations and application vulnerabilities is displayed as a percentage.

Workstations by Severity

This widget shows the severity of the risks threatening the workstations in your environment.

iorWorkstationsBySeverity.png

The impact of the discovered misconfigurations and application vulnerabilities is displayed as a percentage.

Top Devices at Risk

This widget displays the most vulnerable servers and workstations in your environment, according to the overall score calculated after scanning for misconfigurations and vulnerabilities.

iorTopDevicesAtRisk.png

If you click the View All button you will view the entire list of devices exposed to potential threats in the Devices tab of the Security Risks page.

Top Users by Behavior Risks

This widget displays the most vulnerable users in your environment, according to the overall score calculated after analyzing their behavior and activity.

Top-User-Behavior-Risks.png

If you click the View All button you will view the entire list of users that may have been exposing your organization to potential threats through their behavior, in the Users tab of the Security Risks page.