Create Dashboards and Reports
Create comprehensive security monitoring by combining the Query Builder,
custom dashboards and widgets, and automated reports.
| Where Can I Use This? | What Do I Need? |
|
|
One of the following subscriptions:
Device Security subscription for an advanced
Device Security product (Enterprise,
OT, or Medical)
Device Security X subscription
|
Create a tailored monitoring view of your environment by combining the Query Builder,
custom dashboards and widgets, and automated reports.
Use these capabilities together to gain deeper insights into your
network infrastructure. These features work together to transform raw device and
security data into actionable intelligence relevant to your organization's specific
monitoring requirements.
The Query Builder serves as a foundation for data analysis across Device Security.
You can construct complex queries that span multiple domains, combining device
attributes with alert information and vulnerability data to create precise filtering
criteria. When you build queries using the Query Builder's SQL-like interface, you can
save these queries for reuse across custom widgets, dashboards, and scheduled queries.
The Query Builder provides autocomplete functionality and validation to help you
construct valid queries that filter devices, alerts, and vulnerabilities to match
your criteria.
Custom dashboards and widgets leverage the Query Builder's capabilities to create visual
representations of your filtered data. You can use saved queries from the Query Library
when building custom widgets, ensuring consistent data filtering across your monitoring
interface. Custom widgets support various chart types, such as bar charts, pie charts,
line graphs, and tables, helping you visualize the results of your queries in a
chosen format. When you create multiple widgets using related queries, you can group
them into custom dashboards that provide focused views of interconnected security data.
The reporting system complements this integrated approach by automating the delivery of
network security insights. You can schedule saved queries to run on a recurring basis,
with results stored in the Query Log. For more targeted insights, you can generate
pre-formatted reports for Discovery, Utilization, and Risk data. Some reports
address specific compliance monitoring requirements. This automation ensures that
stakeholders receive consistent updates, whether you use custom scheduled queries or
scheduled reports generation.
This integrated approach provides significant operational benefits. You can monitor
specific device subsets through queries while simultaneously generating
executive-level reporting dashboards that use the same underlying data filters.
The ability to create and save complex queries once, then apply them across
multiple monitoring interfaces, reduces the time required to maintain consistent
security views. When you need to adjust your monitoring criteria, you can modify
saved queries in the Query Library, and these changes automatically propagate
to widgets or dashboards that reference those queries.