The Risk Management Dashboard
The Risk Management page provides an overview of your network security and risk assessment information.
The data displayed on this page is organized in several widgets:
Important
When you access the Dashboard for the first time you will be prompted with a notification bar that requires your permission to allow GravityZone to monitor unusual user activity.
Note
See User Behavior Risk Data Collection for more details on how we process user data.
Company Risk Score
The overall risk score displays the level of risk your organization is exposed to by misconfigured system settings, known vulnerabilities of currently installed applications, and potential risks caused by user activity and behavior.
The score represents an average of the three major risk categories: Misconfiguration, App Vulnerabilities, and Human Risks, and it is adjusted using the Health Industry Modifier.
Click the widget and a details panel will open where you can see details of how the overall risk is being calculated and broken down into subcategories.
Note
Running an on-demand Risk Scan on a new target device will influence the overall score. The results will be kept for 90 days, or until the next scan.
Health Industry Modifier
The Health Industry Modifier dynamically adjusts the company score based on common vulnerabilities and exposures (CVEs) discovered in your environment, which have already been exploited at industry level.
Score Over Time
This widget is a histogram that displays the weekly evolution of the number of affected devices detected as vulnerable after risk scans. The histogram data represents the number of devices affected by risk indicators from the last seven days, until 12 AM (server time) of the current day.
Top Misconfigurations
This widget displays the top 15 results for indicators that triggered a risk alert after scanning the devices, ordered by the number of affected devices. Each card represents one indicator that has triggered a risk alert for at least one device.
Each card displays the following elements:
The indicator's name
The number of devices detected as vulnerable for this indicator
The severity for the current indicator of risk
If you click the individual indicator widget it will open the selected indicator of risk in the Misconfigurations tab of the Security Risks page, where you may take appropriate actions to mitigate this risk.
If you click the View All button you will view the entire list of discovered misconfigurations in the Misconfigurations tab of the Security Risks page.
Note
For more details on misconfigurations, refer to GravityZone Indicators of Risk.
Top Vulnerable Apps
This widget displays the top 15 results for known application vulnerabilities that triggered a risk alert after scanning the devices, ordered by the number of affected devices. Each card represents one vulnerable application that raised a risk alert for at least one device.
Each card displays the following elements:
The application's name.
The number of devices made vulnerable by this application.
The severity for the vulnerable application.
If you click the individual app widget it will open the selected vulnerability in the App Vulnerabilities tab of the Security Risks page, where you may take appropriate actions to mitigate this risk.
If you click the View All button you will view the entire list of discovered application vulnerabilities in the App Vulnerabilities tab of the Security Risks page.
Note
You can find details about known application vulnerabilities on the CVE Details website.
Top User Behavior Risks
This widget displays the top 15 results for potential risks caused by unintentional or reckless behavior of users active in your network, ordered by the number of vulnerable users. Each card represents a human based risk caused by at least one user.
If you click the individual human risk widget it will open the selected risk in the User Behavior Risks tab of the Security Risks page, where you may view and analyze it in more detail.
If you click the View All button you will view the entire list of all the discovered human risks generated by user activity in the User Behavior Risks tab of the Security Risks page.
Note
This new ERA feature is available as a preview version, enabling you only to view human-based risks, and to ignore them if they are irrelevant to your environment. More enhanced functionality will be added in the coming future.
Note
See User Behavior Risk Data Collection for more details on how we process user data.
Servers by Severity
This widget shows the severity of the risks threatening the servers in your environment.
The impact of the discovered misconfigurations and application vulnerabilities is displayed as a percentage.
Workstations by Severity
This widget shows the severity of the risks threatening the workstations in your environment.
The impact of the discovered misconfigurations and application vulnerabilities is displayed as a percentage.
Top Devices at Risk
This widget displays the most vulnerable servers and workstations in your environment, according to the overall score calculated after scanning for misconfigurations and vulnerabilities.
If you click the View All button you will view the entire list of devices exposed to potential threats in the Devices tab of the Security Risks page.
Top Users by Behavior Risks
This widget displays the most vulnerable users in your environment, according to the overall score calculated after analyzing their behavior and activity.
If you click the View All button you will view the entire list of users that may have been exposing your organization to potential threats through their behavior, in the Users tab of the Security Risks page.