Skip to main content

Cyber Monitoring

Navigation to Cyber Monitoring

To navigate your way to the Cyber Monitoring Dashboard, you must click the redirect icon image.png beside the "Cyber Monitoring" title.

image.png

This will then redirect you to the dashboard as seen below.

image.pngHere you will see the 6 modules:

  1. Cyber Incident Management (SIEM and XDR)
  2. Cloud Security Posture Management (CSPM)
  3. Endpoint Detection and Response (EDR, MDR)
  4. Security Orchestration, Automation and Response (SOAR)
  5. User and Entity Behavior Analysis (UEBA)
  6. Threat Intelligence (TI)

By clicking on their icons, you will be redirected to the modules' "Main Page" section.

Below the modules, you will find the overview.

Average Key Risk Indicator (KRI) Changes

Understanding the volume of digital assets within your environment is fundamental to managing cyber risk. The total number of assets reflects the scale of your digital footprint and highlights potential vectors for exploitation. By quantifying these assets, organizations gain clarity on how broad their exposure surface truly is. This visibility allows teams to prioritize defenses, allocate resources effectively, and reduce blind spots. Recognizing the scope of what’s connected is the first step toward controlling it.

image.png

CSPM Rank

Understanding the state of your cloud security is critical. The Cloud Security Posture Management (CSPM) score provides a quantifiable snapshot of how securely your cloud environments are configured. It reflects alignment with established best practices and recognized security standards, offering a clear benchmark for posture maturity. By highlighting deviations, gaps, or misconfigurations, the score empowers teams to prioritize remediation efforts based on risk impact. This metric doesn’t just inform—it drives accountability and continuous improvement, giving organizations the visibility needed to evolve with confidence in an ever-changing threat landscape.

image.png


Cases

This section showsprovides thea comprehensive overview of your casesactive and historical cases. It is designed to helpassist you prioritize.in quickly assessing the status and urgency of each case, enabling effective prioritization and informed decision-making.

image.png

This showsmetric howdisplays manthe number of days have passedelapsed since the lastmost recent detection of high or critical-level monitoring alerts. A shorter durationinterval may indicatesignal persistentthe presence of ongoing or recentrecently seriousemerged significant threats.

image.png

This displayssection thepresents distributiona visual breakdown of active cases basedcategorized onby severity levelslevels: (Severe, High, Elevated, Guarded, and Low)Low. ThisThe helpsdistribution prioritizeprovides a clear snapshot of the current threat landscape and assists in the prioritization of response efforts basedaccording onto urgency.the urgency of each case.

image.png

This showssection displays the totalcumulative numbercount of open cases groupedcategorized by their current stage within the Threat Escalation Protocol (TEP). stages.It Thisprovides alsoa indicatesclear overview of how individual threats are progressingadvancing through the definedstructured escalation process.process, enabling efficient tracking and management of threat progression.

image.png


Log Sources

This section showsprovides thea consolidated overview of yourall configured log sourcessources. Its primary purpose is to helpassist youusers prioritize.in assessing the current log ingestion landscape, enabling effective prioritization of monitoring, investigation, and resource allocation efforts.

image.png

This section presents the total count of endpoints currently managed by Endpoint Detection and Response (EDR) agents. It also provides a real-time status breakdown, indicating how many endpoints are online and how many are offline.

image.png

This section presents the distribution of collected log data categorized by individual source. It serves as a valuable reference for identifying the most active log-generating systems. Understanding this distribution is essential for optimizing data flow, resource allocation, and maintaining efficient log management practices.

image.png

This shows the total volume of logs collected daily, measured against allocate capacity. Helps manage storage utilization and detect unusual log activity.

image.png

This section displays a comprehensive list of all installed log collectors, along with the agents associated with each log collector.

image.png