User guide
Dashboard
4
Dashboard
Security > Dashboard
Similar information is provided by Info Center > Reporting > Reports > Security.
The Dashboard page provides a dashboard view of the status of machines installed with Endpoint
Security.
Endpoint Security Statistics
License Status
License Count
Top Machines with Threats
Top Threats Discovered
Note: The list of machine IDs displayed depends on the Machine ID / Group ID filter and machine groups
the user is authorized to see using System > User Security > Scopes.
Endpoint Security Statistics
The Endpoint Security Statistics section provides various statistics about the security status of endpoints
and the status of security definitions.
<N> Endpoints Need Reboot
<N> Signature versions older than '<version>'
<N> Endpoints with older version of Endpoint Security
<N> Endpoints not having a scan completed this week
<N> Endpoints currently running a scan
<N> Endpoints with Resident Shield disabled
Click any of these hyperlinked statistics to see a tabbed dialog showing each member belonging to that
statistic.
License Status
A pie chart displays the percentage of machines that have expired licenses or will have expired
licenses in 30, 60, 90 or 91+ days. Click any slice of the pie chart or any label of the pie chart to display
a list of individual machines belonging to that slice.
License Count
Lists license counts for the following:
Purchased Licenses
Full Available Licenses (Purchased not allocated or installed or expired)
Allocated Licenses (Scheduled for install, but install not yet complete)
Applied Licenses (Active license applied to a machine)
Partial Available Licenses (Formerly assigned to a machine but returned to pool before
expiration)
Partial Allocated Licenses (Partial Available that has been scheduled for install, but install not yet
complete)
Total Licenses (Purchase licenses minus expired)
Expired Licenses
Top Machines with Threats
Lists the machines with the greatest number of current threats. The number of threats in the virus vault
are also listed. Clicking a hyperlinked machine ID displays the threats belonging to that machine ID in
the View Threats (page 11) page.