Displays the real-time status of system performance, services, connections, and other system parameters. Green indicates everything is fine, orange indicates a warning, and red indicates something needs immediate attention.
Each item is clickable to reveal additional details and graphs, as well as helpful system and network tools you can use for troubleshooting purposes such as ping, trace route, packet capture, command-line access, and much more.
This provides an overview of traffic processed in the last 24 hours including web activity, allowed and blocked apps, and web categories, as well as network attacks.
You can quickly determine when your peak traffic periods are, and how effective your policies are doing at blocking unwanted activity and traffic.
The Sophos Security Heartbeat widget indicates the health status of all your Sophos Cloud managed endpoints. If any systems are running unwanted or infected applications, they will show up as yellow or red.
Clicking the widget reveals full details on the affected computer, including the user, hostname, IP address, and even the process responsible, enabling you to quickly take action. You can also use Security Heartbeat status in your policies to limit access to network resources for affected systems.
This widget provides an immediate indication of the presence of advanced threats on your network—either bot-net or command-and-control (C&C) traffic that has been blocked.
Clicking the alert will reveal details about the infected system, including the hostname, IP address, and source of the malicious traffic.
Unique to Sophos, User Threat Quotient (UTQ) is an indication of a user’s risk level based on recent web and advanced threat activity. This widget is green when risk levels are low, and turns red when a threshold of risky activity is detected, indicating the number of high risk users.
The score is analyzed over a seven-day period and clicking on it will take you directly to the detailed UTQ report.
The connections widget shows the status of various connected devices and users including Remote Ethernet Device (RED) VPN connections, pending and active wireless access points, remote SSL VPN connections, and the current live users count.
Clicking the various components of this widget will take you directly to the respective setup or reporting screen.
This panel displays the top five reports that may have data of interest or that require action based on automatic background analysis. Examples include high-risk applications, objectionable websites, web users, intrusion attacks, web server attacks, and more.
Clicking any of the listed reports will open a PDF view of the full report.
The Active Policies in the control center indicates exactly how many policies you have of each type and how many are unused, disabled, changed, and recently added.
Unused policies are a good indication of policies that may benefit from some housekeeping as they can present potential openings or vulnerabilities in the network that are no longer required.