Create Dashboards and Reports
Focus
Focus
Device Security

Create Dashboards and Reports

Table of Contents

Create Dashboards and Reports

Create comprehensive security monitoring by combining the Query Builder, custom dashboards and widgets, and automated reports.
Where Can I Use This?What Do I Need?
  • Device Security (Managed by Strata Cloud Manager)
One of the following subscriptions:
  • Device Security subscription for an advanced Device Security product (Enterprise, OT, or Medical)
  • Device Security X subscription
Create a tailored monitoring view of your environment by combining the Query Builder, custom dashboards and widgets, and automated reports. Use these capabilities together to gain deeper insights into your network infrastructure. These features work together to transform raw device and security data into actionable intelligence relevant to your organization's specific monitoring requirements.
The Query Builder serves as a foundation for data analysis across Device Security. You can construct complex queries that span multiple domains, combining device attributes with alert information and vulnerability data to create precise filtering criteria. When you build queries using the Query Builder's SQL-like interface, you can save these queries for reuse across custom widgets, dashboards, and scheduled queries. The Query Builder provides autocomplete functionality and validation to help you construct valid queries that filter devices, alerts, and vulnerabilities to match your criteria.
Custom dashboards and widgets leverage the Query Builder's capabilities to create visual representations of your filtered data. You can use saved queries from the Query Library when building custom widgets, ensuring consistent data filtering across your monitoring interface. Custom widgets support various chart types, such as bar charts, pie charts, line graphs, and tables, helping you visualize the results of your queries in a chosen format. When you create multiple widgets using related queries, you can group them into custom dashboards that provide focused views of interconnected security data.
The reporting system complements this integrated approach by automating the delivery of network security insights. You can schedule saved queries to run on a recurring basis, with results stored in the Query Log. For more targeted insights, you can generate pre-formatted reports for Discovery, Utilization, and Risk data. Some reports address specific compliance monitoring requirements. This automation ensures that stakeholders receive consistent updates, whether you use custom scheduled queries or scheduled reports generation.
This integrated approach provides significant operational benefits. You can monitor specific device subsets through queries while simultaneously generating executive-level reporting dashboards that use the same underlying data filters. The ability to create and save complex queries once, then apply them across multiple monitoring interfaces, reduces the time required to maintain consistent security views. When you need to adjust your monitoring criteria, you can modify saved queries in the Query Library, and these changes automatically propagate to widgets or dashboards that reference those queries.