Using the Dashboard

The Policy Manager Dashboard organizes and presents the key information about the status and performance of the current Policy Manager server or cluster, as well as a set of Quick Links to the most commonly used functions, such as configuring policies, and viewing the Access Tracker. The Dashboard information is illustrated in interactive bar chart, graph, and table formats.

To customize the Dashboard layout to display the information you most want to see (as described in Table 1), drag and drop from the list of the Widget elements on the left pane to one of the available Dashboard slots in the right pane.

Table 1: Dashboard Widget Summary

 

To view the table with latest system level events, drag and drop the Alerts widget to the Dashboard. Clicking on a row drills down to the Event Viewer.

To view the graph that displays all requests (such as RADIUS Remote Authentication Dial-In User Service. An Industry-standard network access protocol for remote authentication. It allows authentication, authorization, and accounting of remote users who want to access network resources. , TACACS+ Terminal Access Controller Access Control System+. TACACS+ provides separate authentication, authorization, and accounting services. It is derived from, but not backward compatible with, TACACS. , and WebAuth requests) processed by Policy Manager over the past week, drag and drop the All Requests widget.

Clicking on each bar in the graph drills down to the Access Tracker page and shows the requests for the selected day.

To view the links to the Insight, Guest, and Onboard applications that are integrated with Policy Manager, drag and drop the Applications widget to the Dashboard.

To view a graph of the failed and successful requests over the past week, drag and drop the Authentication Status to the Dashboard. This graph includes RADIUS Remote Authentication Dial-In User Service. An Industry-standard network access protocol for remote authentication. It allows authentication, authorization, and accounting of remote users who want to access network resources. , WebAuth, and TACACS+ Terminal Access Controller Access Control System+. TACACS+ provides separate authentication, authorization, and accounting services. It is derived from, but not backward compatible with, TACACS.  requests. The default data filters Failed Requests and Successful Requests are used to plot this graph.

Clicking on each circle on the line graph drills down to the Access Tracker page that shows the failed and successful requests for the day specified.

To view the status of all nodes in a cluster, drag and drop the Cluster Status widget to the Dashboard. The following fields are shown for each node:

Status: Shows the overall health status of the cluster. Green indicates healthy status. Red indicates connectivity problems or high CPU Central Processing Unit. A CPU is an electronic circuitry in a computer for processing instructions. or high memory utilization. The status also shows red when a node is out-of-sync with the rest of the cluster.

Host Name: Specifies the name of the host and IP address of the node.

Zone: The configured cluster zone.

Server Role: Indicates whether the cluster node is a publisher or subscriber. If a Policy Manager appliance is a subscriber in a cluster, all configuration options throughout the user interface specific to the publisher are grayed-out.

Last Replication: Date of the last replication.

Status: Indicates the status of the cluster node.

To view the chart that shows the graph of all profiled devices categorized into the following categories:

Access Points

Building Automation

Computer

Conflict

Indicates a conflict occurred in the categorization of the device.

Datacenter Appliance

Game Console

Monitoring Devices

Network Boot Agents

Physical Security

Printer

Router

Server

Smart Device

Switch

Unknown

Indicates devices that are not included in the Profiler database.

VOIP phone

To view the device family of a particular device category, drag and drop the Device Category widget to the Dashboard, then select the device category from the drop down menu. For example, selecting Computer would show that the device family is Windows.

To view the Device Insight tags, drag and drop the Device Insight Tags widget to the Dashboard.

To view a display that shows the number of smart devices, computers, and unmanaged devices, as well as the total number of devices defined by the Endpoint Profiler for this Policy Manager server, drag and drop the Endpoint Profiler Summary widget to the Dashboard.

 

To view the table with the latest failed authentications, drag and drop the Failed Authentications widget to the Dashboard.

Clicking on a row drills down to the Access Tracker page and shows failed requests sorted by timestamp, with the latest request displayed on the top.

To view the graph of the healthy and unhealthy requests over the past week, drag and drop the Health Status widget.

Healthy requests are the requests to which the health state was deemed to be healthy based on the posture data sent from the client.

Unhealthy requests are the requests to which the health state was deemed to be quarantined (posture data received but health status is not compliant) or unknown (no posture data received).

This includes RADIUS Remote Authentication Dial-In User Service. An Industry-standard network access protocol for remote authentication. It allows authentication, authorization, and accounting of remote users who want to access network resources.  and WebAuth requests. The default data filters Health Requests and Unhealthy Requests are used to plot this graph.

Clicking on each circle on the line graph drills down to the Access Tracker page that shows the healthy and unhealthy requests for the last week.

To view the table with the latest authentications, drag and drop the Latest Authentications widget to the Dashboard. Clicking on a row in the table drills down to the Access Tracker page that shows requests sorted by timestamp with the latest request displayed on the top.

To view the table that displays the Available Count and Used Count of the application licenses installed on the current Policy Manager server, drag and drop the License Usage widget to the Dashboard.

From the Select Application drop-down, select the Application License of interest.

Verify each license indicates the current support end date, as only supported customers can upgrade their system(s).

To view the charts that show the endpoints discovered, drag and drop the MDM Discovery Summary widget to the Dashboard.

The endpoints are displayed in separate charts based on the endpoint's operating system.

Clicking a chart drills down to the Configuration > Identity > Endpoints page. The results depends on the operating system selected.

For example, if you click the Android devices chart, you can view the list of only Android devices in the Endpoints page.

To view a display that shows the number of Linux, macOS, and Windows OnGuard clients, as well as the total number of OnGuard clients for this Policy Manager server, drag and drop the OnGuard Clients Summary to the Dashboard.

To view the links to the following configuration tasks, drag and drop the Quick Links widget to the Dashboard:

Start Configuring Policies

Manage Services

Access Tracker

Analysis and Trending

Network Devices

Server Manager

Guest

Onboard

Insight

Extensions

To view the trend of total request processing time, drag and drop the Request Processing Time widget to the Dashboard.

To view the bar chart with each bar representing a categorized Policy Manager service request, drag and drop the Service Categorization widget to the Dashboard.

Clicking on a bar drills down to the Access Tracker that shows the requests that were categorized into a specific service.

To view a table with the latest successful authentications, drag and drop the Successful Authentications widget to the Dashboard.

Clicking on a row in the table drills down to the Access Tracker page that shows successful requests sorted by timestamp, with the latest request displayed on the top.

To view the CPU Central Processing Unit. A CPU is an electronic circuitry in a computer for processing instructions. usage for the last 30 minutes, drag and drop the System CPU Utilization widget to the Dashboard.

The widget displays the CPU Central Processing Unit. A CPU is an electronic circuitry in a computer for processing instructions. utilization time in minutes and percentage for System, User, and IO Wait time, indicated by color.

CPU Central Processing Unit. A CPU is an electronic circuitry in a computer for processing instructions. utilization is presented in one-minute increments.

To view the Percentage Used statistics for the following components, drag and drop the System Summary widget to Dashboard:

Main Memory

Swap Memory

Disk

Swap Disk

The Authentication Source Status table indicates if an Active Directory Microsoft Active Directory. The directory server that stores information about a variety of things, such as organizations, sites, systems, users, shares, and other network objects or components. It also provides authentication and authorization mechanisms, and a framework within which related services can be deployed. or LDAP Lightweight Directory Access Protocol. LDAP is a communication protocol that provides the ability to access and maintain distributed directory information services over a network. authentication source is reachable by the primary server and all backup servers. Data in this table is updated every 15 minutes, though clicking the Refresh link at the top of this table automatically refreshes the data. Clicking any row in this table opens the  Authentication Sources page where you can view information on all available authentication sources.