WatchGuard EDR Core Security Dashboard

Applies To: WatchGuard EDR Core

The WatchGuard EDR Core Security dashboard shows an overview of the security status of the network for a specific time period. Several tiles show important information and provide links to more details.

The Status page includes similar dashboards and lists to those available in WatchGuard EDR. EDR Core does not include antivirus.

Screen shot of the WatchGuard EDR Security dashboard

Time Period Selector

The dashboard shows information for the time period you select from the drop-down list at the top of the Status page.

Screen shot of time period selector on Security dashboard

You can select these time periods:

  • Last 24 hours
  • Last 7 days
  • Last month
  • Last 3 months

The Security dashboard includes these tiles:

Click a tile to view detailed information.

Status Icons

The icons in the Advanced Protection, Antivirus, Updated Protection, and Knowledge columns indicate their status:

  • The installing icon — Installing
  • The Enabled icon — Enabled
  • The Disabled icon — Disabled
  • The Error icon — Error
  • The No License icon — No License
  • The Not Available Icon — Not Available
  • The Pending Restart icon — Pending Restart

Protection Status

The Protection Status tile shows:

  • Computers where EDR Core is working properly
  • Computers with errors or problems installing or running the product
  • Computers with audit mode enabled

Screen shot of the Protection Status tile

The total number of computers and devices at the center of the tile includes iOS devices. The tile includes no other information about iOS devices. iOS devices do not have advanced or antivirus protection. For more information, go to Configure iOS Device Settings.

To open the Computer Protection Status list, click the tile.

Screen shot of the Computer Protection Status list

Not all columns are available for every type of device.

To filter the Computer Protection Status list:

  1. Click Filters.
  2. Select the Computer Type.
  3. Specify platform, connection, and protection parameters.
  4. Select the Protection Status.
  5. Select the Isolation Status.
  6. Click Filter.

EDR Core does not support Android devices.

Offline Computers

The Offline Computers tile shows the number of computers that have not connected to the cloud for a number of days.

Screen shot of the Offline Computers tile

To review details of the computers that might be susceptible to security problems and require attention, click the tile.

Screen shot of the Offline Computers list

For more information on the icons used in this list, go to Icons.

Outdated Protection

The Outdated Protection tile shows the number of computers with a signature file that is more than three days older than the latest released file. It also shows the computers with an antivirus engine that is more than seven days older than the latest released engine.

  • Protection — For at least seven days, the computer had a version of the antivirus engine older than the latest released engine.
  • Knowledge — The computer has not updated its signature file for at least three days.
  • Pending Restart — The computer requires a restart to complete the update.

Screen shot of the Outdated Protection tile

Click the progress bar in the tile to see the list of computers associated with each status:

  • Computers with out-of-date protection
  • Computers with out-of-date knowledge
  • Computers pending restart

Programs Allowed by the Administrator

The Programs Allowed by the Administrator tile shows the number of items the administrator allows which EDR Core initially prevented from running. EDR Core classified these programs as a threat (malware, PUP, or exploit) or as unknown files in the process of classification.

Screen shot of the Detected Items Allowed by the Administrator tile

To show specific information in a list, click the tile.

Screen shot of the Detected Items Allowed by the Administrator list

To see all events related to threats and unknown files in the process of classification that the administrator allowed to run, click History.

Malware Activity, Pup Activity, and Exploit Activity

The Malware Activity, PUP Activity, and Exploit Activity tiles show incidents detected in processes run by the workstations and servers on the network, as well as their file systems. Endpoint Security incidents are reported by real-time scans as well as on-demand scan tasks.

EDR Core shows an incident in the Malware Activity and PUP Activity tiles for each computer or threat pair found on the network. If an incident occurs multiple times in five minutes, EDR Core registers only the first incident. The same incident can register a maximum of two times every 24 hours.

Screen shot of the Malware Activity and PUP Activity tiles

  • Run shows the number of malware files that successfully ran on the network.
  • Accessed Data shows the number of times in which the threat accessed user information on the computer hard disk.
  • External Connections shows the number of times there were connections to other computers.
  • The threats copied from computers on the network show the IP address of the computer from which an infection originated, as well as the number of times that IP address was the source of a detection (in parentheses). To open the corresponding list, click the IP address.

  • To open the Malware Activity or PUP Activity list to show a list of the affected computers and malware or PUP incidents, click the tile.

Exploit Activity

The Exploit Activity tile shows the number of vulnerability exploit attacks against Windows computers on the network, including vulnerable driver detections. EDR Core reports an incident in the Exploit Activity tile for each computer or different exploit attack pair found on the network. If an attack repeats several times, EDR Core reports a maximum of 10 incidents every 24 hours for each computer/exploit pair found.

Screen shot of the Exploit Activity tile

Related Topics

About My Lists in Endpoint Security

Risks Dashboard

Unmanaged Computers Discovered List