Start collaborating
Learn more about TechXchange Dev Days virtual and in-person events here
Share on LinkedIn
MaaS360 Zero Trust User Risk Management offering allows the Administrator to track all kinds of security events detected in users' devices deployed across the organization.All these events can be tracked via the Security Events widget available in the Security dashboard. This widget helps evaluate the risk in the organization and analyze any unknown events based on their details.
This widget displays a brief overview of the security events detected in the last 60 days. The security events are categorized based on whether a risk rule is configured for those events.The numbers 2/15 over here mean that out of 15 detected event types in the organization, 2 of them aren't configured. (These two event types do not contribute to the risk score for any device/user). The chart displays the proportion of the event types that have a risk rule disabled to the ones that have a risk rule disabled. Hovering on each of these bars lets us know how many events have been detected in each of the categories.The top event types without risk rule table lists out the top 5 event types detected in the organization that have risk rule disabled.
All of this helps the administrator understand, and customize which event types should be configured, and which should not be, hence those won't contribute to a device's risk score, and won't be considered risky as per the admin.
Clicking on the View all security events button will redirect the admin to the Security events page.
Clicking on the View all event types button on the Security events page opens a slide-out showing all the event types detected in the organization in the last 60 days, again categorized into two groups, Risk rule configured / not configured. Upon clicking any event type, another slide-out pops out, where granular details about that event type are present.
This screen provides us with the event type details, focusing on the trend of the detections in the past two months, and the risk rule details about the event.
In brief, the Security dashboard provides multiple areas and options to the admin to track and evaluate the organization's security. The admin can take tremendous advantage of the Security events page to drill down on the security problems and risks harming the organization.