![]() This panel shows the endpoint by category or device manufacturer over the specific period. This panel tracks the results of endpoint information based on Operating System (OS) over the specific period. This panel shows the endpoint by category or device manufacturer.Īdmin can also drill down to view device category details such as Windows, Linux, Mac, Routers, Network Boot Agents and so on. MAC address, IP address, host name, OS, Category and other attributes) if available to Splunk via PPS/Profiler. This panel tracks the results of endpoint information based on Operating System (OS).Īdmin can also drill down to view the details for endpoints with OS and other contextual information (device ID i.e. The trending analysis for compliance can be used to know the compliance of devices over the period of time for regulatory purpose. The graph shows the number of endpoints that were compliant or non-compliant over the specified period. This panel tracks the results of compliance policies over time. Then this information can be used for capacity planning and troubleshooting purpose.Ĭompliance vs Non-Compliance Policies- Trends ![]() Trending analysis can be useful for multiple reasons.įor example, for active users, it could be useful to know the workload at different time of the day and different day of the week. The graph shows the number of endpoints connected using Pulse Client or through Web Browser (Agentless) over the specified period. This panel tracks the results of login type over time. The Admin can also drill-down to view the details of compliant and non-compliant policies/users (IP address, MAC address, Username, realm, HC Policy, HC result, compliance result, current HC time, etc.) in a tabular format. The graph shows the relative prevalence of compliant/non-compliant policies during the charted period, as a percentage of all endpoints within the reporting scope. This panel displays the results of compliance and non-compliant policies. You can click the visualization tab and modify the visualization. For example, Agentless 元 Auth, Pulse 元 Auth, Pulse L2 Auth, Mac Auth, Native Supplicant L2 Auth.Īdmin can also drill down to view the login details such as Username, IP address, MAC address, realm, roles, sign-in time, agent type, agent version, login type in a tabular format. The graph shows the number of endpoints connected using Pulse Client or through Web browser (Agentless). This panel shows the results of endpoint based on the login. The dashboard presents 12 charts based on the endpoint properties reported by PPS by default. The Splunk application for PPS provides a dashboard with various types of authentication, Host Checker compliance, endpoint classification details. The user must select the IP/Hostname of multiple PPS server from the IP/Hostname field to view the dashboard.įor clustering, all the IP/Hostnames must be selected in the IP/Hostname field for viewing the dashboard. The It analyzes the contextual data from Pulse Policy Secure to help administrators analyze and cross-correlate events on endpoints.įor multiple PPS sending data to Splunk at a time, Splunk app provides dashboard for multiple PPS servers. The Pulse Policy Secure dashboard app for Splunk uses this data to provide various charts for compliance, login type, endpoint by categories, endpoint by OS and so on. The Pulse Policy Secure syslog add on for Splunk provides value to the PPS syslog data, it extracts various event types and additional fields from syslog data. ![]() The PPS integration with Splunk allows security managers to quickly monitor the current operational/security posture. The Pulse Policy Secure app for Splunk allows you to view PPS data in a dedicated, customizable Splunk dashboard. Splunk dashboard application for PPS uses the indexed data to render various charts and to show useful information on dashboard.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |