Curated dashboard queries: UDM
This document is for Security Operations Center (SOC) managers and analysts who want to monitor threat landscapes and system health using curated dashboards— predefined dashboards designed for visibility across various security use cases in Google Security Operations. This document provides a collection of curated dashboards and their underlying queries for the UDMsource type.
The following tables provide a list of charts and their query examples for each curated dashboard. You can use these queries in the query editor or as a baseline for custom widgets. For information on how to create and manage dashboards, see Manage dashboards .
Application Control
This dashboard provides insights on application security, helping security teams detect unauthorized software and enforce usage policies. It supports visibility into risky behaviors, blocked attempts, and unusual activity patterns.
| Chart name | Query example |
|---|---|
| Application Executions Over Time |
|
| Top 10 Unapproved Application Executions (Audit/Allow Mode) |
|
| Top 10 Applications Executing from Removable Media |
|
| Top 10 Blocked Application Executions By Reason |
|
| Application Executions Status Over Time |
|
| Top 10 Blocked Application Executions |
|
| Applications Executing from Atypical Locations |
|
| Top 10 Hosts by Blocked Execution |
|
| Top 10 Users by Blocked Execution |
|
| Blocked Executions - Hourly |
|
Cloud Access Security Broker
This dashboard provides an overview of cloud application usage, security events, threats, and unauthorized access. It monitors top alerts, user activities and actions, and source and destination IP addresses to enhance policy enforcement and risk response.
| Chart name | Query example |
|---|---|
| Top 10 User Agents |
|
| Top 10 Applications |
|
| Top 10 CASB Activities |
|
| Top 10 Destination IPs |
|
| Top 10 Destination Hostnames |
|
| Events by Action: Allow vs. Block |
|
| Authentication Type Distribution |
|
| Top 10 Vendor Alerts |
|
| Top 10 CASB Activities |
|
| Top 10 Vendor Alerts |
|
| Top 10 Source Hostnames |
|
| OS Distribution |
|
| Top 10 Users |
|
| Top 10 Destination Hostnames |
|
| Top 10 Blocked Users |
|
| Events Over Time by Log Type |
|
| Top 10 User Agents |
|
| Events by Action: Allow vs. Block |
|
| Top 10 Applications |
|
| Top 10 Source IPs |
|
| Top 10 Source IPs |
|
| Top 10 Event Types |
|
| OS Distribution |
|
| Top 10 Event Types |
|
| Top 10 URLs |
|
| Events Over Time by Log Type |
|
| Top 10 CASB Events Source Locations |
|
| Top 10 CASB Events Source Locations |
|
| Top 10 Blocked Users |
|
| Top 10 URLs |
|
| Top 10 Users |
|
| Authentication Type Distribution |
|
| Top 10 Source Hostnames |
|
| Top 10 Destination IPs |
|
Chrome Enterprise Premium Operations
This dashboard provides an overview of the Chrome Enterprise Premium integration with Google SecOps. This includes information about browsers and profiles under management.
| Chart name | Query example |
|---|---|
| Side-loaded Browser Extensions |
|
| Most Installed Browser Extensions |
|
| Chrome Events |
|
| Chrome Telemetry Health |
|
| Top 10 Managed Browsers by Chrome Version |
|
| Top 10 Managed Browsers by Operating System |
|
| Management Organizations |
|
| Most Used Browser Extensions |
|
| Top 10 Users with Most Installed Browser Extensions |
|
| Browser Extensions by Permission |
|
| Least Installed Browser Extensions |
|
Chrome Enterprise Premium Security
This dashboard provides real-time insights into Chrome-related security events such as sensitive data transfers, access to high-risk domains, data protection events, malware and phishing attempts, and password security issues. It enables security teams to monitor, investigate, and respond to Chrome-based threats.
| Chart name | Query example |
|---|---|
| Chrome DLP : Data Insights |
|
| Chrome DLP : Total Sensitive Web Transfer |
|
| Chrome DLP : Total Sensitive File Prints |
|
| Chrome DLP : Total Sensitive File Uploads |
|
| Password Reuse Events |
|
| Chrome High-Risk Domains |
|
| Password Breach Events |
|
| Malware Events |
|
| Unsafe Site Visits |
|
| Phishing Events |
|
| Chrome DLP : Total Sensitive Content Transfer |
|
| Chrome DLP : Total Sensitive File Downloads |
|
| Chrome DLP: Users with Sensitive Content Detections |
|
| Chrome DLP : Sensitive Content Domains |
|
CIS Controls Compliance Overview
This dashboard strengthens security governance by offering clear visibility into adherence with CIS Critical Security Controls. It tracks essential compliance metrics such as asset inventory accuracy, vulnerability remediation progress, backup reliability, access control enforcement, and incident response preparedness.
| Chart name | Query example |
|---|---|
| Inactive Users (More Than 7 Days) |
|
| Recent Blocked Application Executions |
|
| SSO Authentication Summary |
|
| IDS / IPS Events Distribution |
|
| Privileged Account MFA Events Over Time |
|
| Top 10 Systems with Critical/High Vulnerabilities |
|
| Recent Phishing Events |
|
| Weak Encryption Algorithms Over Time |
|
| Permission Changes Over Time |
|
| Recent User Account Creations |
|
| User Account Creations Over Time |
|
| VPN Connection Success v/s Failure Trends Over Time |
|
| Malware Detections Over Time |
|
| High/Critical Vulnerability by Age |
|
| Top 10 Service Accounts by Logins |
|
| Malware File Details |
|
| Network-Based Malicious Activities |
|
| Privileged Account Activities & Modifications |
|
| Login Events Over Time by Action |
|
| Data Security Events Distribution |
|
| Data Deletion and Purge Events |
|
| Vulnerability Scans Over Time |
|
| Phishing Events Over Time |
|
| Recent Backup Events |
|
| Top 10 Email Threats by Severity |
|
| Backup Events Over Time |
|
| Total Devices Over Time |
|
| Top 10 Blocked Application Executions |
|
| Blocked MFA Attempts for Privileged Accounts |
|
Cloud Key Management Overview
This dashboard offers a detailed view of key management activities within your organization's cloud infrastructure. The dashboard monitors the status of Keys, Certificates, and Secrets across their lifecycle-created, deleted, enabled, rotated, and disabled-enabling the detection of anomalies or unauthorized activities.
| Chart name | Query example |
|---|---|
| Objects Disabled Over Time |
|
| Total Event Count by Log Type |
|
| Top 10 Users Creating Objects |
|
| Objects Deleted Over Time |
|
| Objects Created Over time |
|
| Top 10 Source IPs Enabling Objects |
|
| Top 10 Users Rotating Objects |
|
| Objects Rotated Over Time |
|
| Top 10 Source IPs Rotating Objects |
|
| Top 10 Users Deleting objects |
|
| Top 10 Objects Rotated |
|
| Top 10 Objects Disabled |
|
| Top 10 Blocked Users |
|
| Top 10 Users Enabling Objects |
|
| Recent Objects Created (Last 24 Hours) |
|
| Top 10 Objects Enabled |
|
| Top 10 User Agents |
|
| Top 10 Source IPs Creating Objects |
|
| Top 10 Object Locations |
|
| Objects Enabled Over Time |
|
| Top 10 Blocked Source IPs |
|
| Objects Created by Geolocation |
|
| Top 10 Users Disabling Objects |
|
| Top 10 Source IPs Disabling Objects |
|
| Recent Objects Deleted(Last 24 Hours) |
|
| Top 10 Source IPs Deleting Objects |
|
Cloud Security Posture Overview
This dashboard provides Cloud Security posture insights by tracking key metrics across Google Cloud, AWS, and Azure.
| Chart name | Query example |
|---|---|
| Top 10 Triggering Rules |
|
Cloud Storage Services Overview
This dashboard provides valuable insights on cloud storage activities such as resources created, deleted, accessed, updated, and permissions changed. It includes trend visualizations of events and alerts over time and highlights top users, IP addresses, user agents, and resource locations. This information helps identify unusual patterns, monitor alerts, and maintain data integrity while protecting cloud environments.
| Chart name | Query example |
|---|---|
| Top 10 Source IPs Accessing Resources |
|
| Resources Accessed by Geolocation |
|
| Top 10 User Agents |
|
| Top 10 Source IPs Updating Resources |
|
| Top 10 Resources Accessed |
|
| Resources Deleted Over Time |
|
| Top 10 Blocked Users |
|
| Recent Resources Created (Last 24 Hours) |
|
| Resources Accessed Over Time |
|
| Top 10 Source IPs Changing Resource Permissions |
|
| Recent Resources Deleted (Last 24 Hours) |
|
| Top 10 Blocked Source IPs |
|
| Events Over Time |
|
| Top 10 Resource Locations |
|
| Top 10 Source IPs Deleting Resources |
|
| Resource Permissions Changed Over Time |
|
| Top 10 Source IPs Creating Resources |
|
| Top 10 Users Accessing Resources |
|
| Top 10 Resources with Permission Changed |
|
| Top 10 Users Updating Resources |
|
| Top 10 Users Changing Resource Permissions |
|
| Resources Created Over Time |
|
| Top 10 Resources Updated |
|
| Top 10 Users Deleting Resources |
|
| Top 10 Users Creating Resources |
|
| Resources Updated Over Time |
|
| Publicly Shared Buckets |
|
DDOS Overview
This dashboard provides a comprehensive analysis of Distributed Denial-of-Service (DDoS) activities, offering insights into attack trends, patterns, and behaviors. It helps identify threat vectors and high-risk areas within the network, empowering security teams to effectively detect, respond to, and mitigate DDoS attacks.
| Chart name | Query example |
|---|---|
| Top 10 Vendor Alerts |
|
| Top 10 Source IPs by Action |
|
| Events by Event Type |
|
| Vendor Alerts Over Time by Log Type |
|
| Events Over Time by Log Type |
|
| Events by Description |
|
| Source Geolocation Overview |
|
DNS Monitoring
This dashboard provides a detailed overview of DNS activity and network health, featuring insights into DNS events, query trends, and the distribution of allowed and blocked queries. It enables efficient monitoring, threat detection, and troubleshooting through visualizations of anomalies, locations, and DNS failures.
| Chart name | Query example |
|---|---|
| Top 10 Allowed DNS Queries |
|
| Top 10 DNS Allowed Categories |
|
| Total DNS Events |
|
| Reporting Hosts |
|
| Top 10 DNS Questions |
|
| Total DNS Events |
|
| Total DNS Events by Log Type |
|
| Top 10 DNS Blocked Categories |
|
| Successful DNS Response Over Time |
|
| Common DNS Activities |
|
| Top 10 Blocked DNS Queries |
|
| DNS Queries by Action: Allow vs Block |
|
| DNS Events by Log Type Over Time |
|
| DNS Record Types Breakup |
|
| Failed DNS Response Over Time |
|
| Top 10 Source IPs |
|
| DNS Record Types over Time |
|
| Total DNS Events by Log Type |
|
| Total Log Volume of DNS Events Over Time |
|
| Failed DNS Response Over Time |
|
| DNS Record Types Breakup |
|
| Top 10 Source IPs |
|
| DNS Queries by Record Type |
|
| Total Reporting Hosts |
|
| DNS Queries Over Time |
|
| Successful DNS Response Over Time |
|
| Common DNS Activities |
|
| Top 10 DNS Queries by Location |
|
Data Ingestion and Health
This dashboard provides critical insights into data flow, displaying ingested events and error counts for clear visibility into potential issues. It includes visualizations for log type distribution and the status of ingested events, along with recent ingestion activity and daily log information. By tracking ingestion throughput over various timeframes, the dashboard helps spot trends and issues, improving your organization's ability to manage data ingestion and maintain smooth operations.
| Chart name | Query example |
|---|---|
| Bindplane Agent Logging - Logs by Severity over Time |
|
| Number of Days Since Hosts Reported an Event (Last 7 Days) |
|
| Bindplane Agent Logging - Messages by Count |
|
Data Loss Prevention (DLP)
This dashboard provides key metrics related to DLP events.
| Chart name | Query example |
|---|---|
| Top 10 Users |
|
| Sensitive Data Access Attempts |
|
| DLP Event Trend Over Time |
|
| Events By Action |
|
| DLP Violations by Severity |
|
| Top 10 DLP Policy Violation Event Types |
|
| DLP Violations over Time |
|
| Top 10 Hosts |
|
| Top 10 DLP Rules |
|
| Top 10 Users by Data Exfiltration Attempts |
|
| Top 10 Files |
|
Data Security Monitoring
This dashboard provides a comprehensive view of security events provided by data security tools, focusing on metrics like event severity, actions taken, and triggering rules. It tracks top hosts, users, and geographical patterns to identify emerging threats and trends.
| Chart name | Query example |
|---|---|
| Events by Severity |
|
| Events Over Time By Log Type |
|
| Events by Action |
|
| Source Geolocation Heatmap |
|
| Event Types Distribution |
|
| Total Events |
|
| Top 10 Events by Description |
|
| Top 10 Source Hostnames |
|
| Top 10 Source Usernames |
|
| Top 10 Data Security Product Rules Triggered |
|
Database Monitoring
This dashboard provides in-depth visibility into database operations, security, performance, and health by tracking user activities, executed SQL statements, login trends, and event severities. This helps you identify unusual behaviors, ensure operational efficiency, and proactively manage risks across database environments.
| Chart name | Query example |
|---|---|
| Events by Action |
|
| Objects by Severity |
|
| Failed Login Attempts Over Time |
|
| Top 10 Users by CREATE Statements |
|
| Privileged Access Granted |
|
| Top 10 Users by DROP Statements |
|
| Top 10 Database-Related File Paths |
|
| Recent File Operations |
|
| Recent Users by CREATE Statements |
|
| Recent Failed Login Attempts |
|
| DDL Statements |
|
| Top 10 Statements Executed |
|
| Recent Successful Login Attempts |
|
| Recent Users by Database Connections |
|
| Successful Login Attempts Over Time |
|
| Grant Events Over Time |
|
| Application Traffic Over Time |
|
| Recent Users by DROP Statements |
|
| DDL Statements Over Time by Log Type |
|
| Database Events by Application |
|
| Severity Distribution |
|
Deception Monitoring
This dashboard provides a comprehensive overview of deception-related activities, offering insights into event trends, patterns, and behaviors. It also highlights high-risk areas within decoy networks, enabling security teams to analyze, monitor, and respond to threats effectively.
| Chart name | Query example |
|---|---|
| Top 10 Destination IPs |
|
| Top 10 Source IPs |
|
| Events Over Time by Log Type |
|
| Top 10 Ports and Protocols |
|
| Source Geolocation Overview |
|
| Top 10 Destination Hostnames |
|
| Decoy's Kill Chain Phase Breakdown (Zscaler Deception) |
|
| Top 10 Source Users |
|
| Top 10 Event Types by Log Type |
|
| Top 10 Targeted Decoy Resource Types (Zscaler Deception) |
|
| Top 10 Decoys with High-Risk Scores (Zscaler Deception) |
|
| Activity Breakdown by Decoy Network (Zscaler Deception) |
|
| Events by Severity |
|
EDR Alerts Overview
This dashboard provides a comprehensive view of assets, events, and active threat detections which offers enhanced visibility and control.
| Chart name | Query example |
|---|---|
| Top 10 EDR Alerts |
|
| Top 10 EDR Alerts |
|
| Total EDR Alerts |
|
| Active EDR Sensors |
|
| Top 10 Hosts based on EDR Alerts |
|
| Number of EDR Sensors |
|
| Top 10 Techniques |
|
| Severity based on EDR Alerts |
|
| Severity based on EDR Alerts |
|
| Top 10 Tactics |
|
| Total EDR Alerts Over Time |
|
| Active EDR Sensors |
|
| Total EDR Alerts Over Time |
|
| Top 10 Techniques |
|
| Top 10 Users based on EDR Alerts |
|
| Top 10 Users based on EDR Alerts |
|
| Top 10 Tactics |
|
| Total EDR Alerts |
|
| Number of EDR Sensors |
|
| Top 10 Hosts based on EDR Alerts |
|
Email Activity Overview
This dashboard provides a detailed summary of email traffic, including total volumes, allowed versus blocked emails, unique senders, unique recipients, and key statistics on top senders and recipients. It provides valuable insights into communication patterns and enhances email security, filtering effectiveness, and overall email management.
| Chart name | Query example |
|---|---|
| Recent Email Events |
|
| Blocked Emails |
|
| Top 5 Recipients by Log Type |
|
| Allowed Email Events |
|
| Top 5 Recipients by Log Type |
|
| Total Email Events |
|
| Top 10 Email Log Source by Event Type |
|
| Allowed Email Events |
|
| Top 5 Senders by Log Type |
|
| Unique Senders |
|
| Unique Senders |
|
| Total Email Events |
|
| Top 5 Senders by Log Type |
|
| Recent Email Events |
|
| Unique Recipients |
|
| Blocked Emails |
|
| Unique Recipients |
|
| Top 10 Email Log Source by Event Type |
|
Email Security Overview
This dashboard provides information anout email threats like phishing, malware, ransomware, and Business Email Compromise (BEC). It provides an overview of security related events, malicious senders, source IPs, and targeted email addresses.
| Chart name | Query example |
|---|---|
| Top 10 Identified Domains |
|
| Total Phishing Detected |
|
| Email Category Over Time |
|
| Top 10 Suspicious URLs |
|
| Phishing Detected |
|
| Top 10 Malicious Source IPs |
|
| Email Threats by Category |
|
| Action Taken Over Time |
|
| Email Threat Identified Over Time |
|
| Email Threat Identified Over Time |
|
| Recent Active Threats |
|
| Blocked vs. Permitted URLs |
|
| Phishing Detected |
|
| Top 10 Malicious Senders |
|
| Recent Malicious Attachments |
|
| Total Phishing Detected |
|
| Top 10 Targeted Emails |
|
| Email Category Over Time |
|
| Top 10 Suspicious URLs |
|
| Action Taken Over Time |
|
| Top 10 High Severity Threats |
|
| Top 10 Malicious Source IPs |
|
| Top 10 Malicious Senders |
|
| Blocked vs. Permitted URLs |
|
| Recent Malicious Attachments |
|
| Top 10 Malicious Locations |
|
| Email Threats by Category |
|
| Top 10 Email Threats by Severity |
|
| Recent Active Threats |
|
| Threat Status Distribution |
|
| Security Results Action Distribution |
|
| Security Results Action Distribution |
|
| Top 10 Targeted Emails |
|
| Top 10 Malicious Locations |
|
| Top 10 High Severity Threats |
|
| Threat Status Distribution |
|
| Top 10 Email Threats by Severity |
|
| Top 10 Identified Domains |
|
FEDRAMP Continuous Monitoring
This dashboard provides a clear view of system compliance and security posture. It tracks vulnerabilities, and control effectiveness against FedRAMP standards, helping you stay compliant and prioritize remediation efforts.
| Chart name | Query example |
|---|---|
| Total Inbound Connections |
|
| Systems with Available Updates |
|
| Recent Media Protection Vendor Alerts |
|
| Top 10 Blocked Domains |
|
| Network Traffic Over Time by Direction |
|
| Vulnerabilities by Severity |
|
| Top 10 Blocked Application Executions By Reason |
|
| Weak TLS Version Usage Over Time |
|
| Sign Ins by Status Over Time |
|
| MFA Enrollment Status |
|
| Top 10 Endpoints by High Severity Alerts |
|
| Top 10 Inbound IP Address |
|
| Media Protection Vendor Alerts by Action Over Time |
|
| Top 10 Recent User Badge-Ins |
|
| High Severity Endpoint Detections Over Time |
|
| Total Outbound Connections |
|
| Top 10 Users by Failed Sign Ins |
|
| TLS Cipher Distribution |
|
| DLP Violations by Severity |
|
| Vulnerabilities by Age |
|
| User Accounts Change Permissions |
|
| Top 10 Outbound IP Address |
|
| Top 10 Users by Privileged Actions |
|
Firewall Activity Monitoring
This dashboard provides information about firewall activity to enhance security and performance management. It provides real-time insights into network security by tracking various metrics and events related to firewall activity, helping users to effectively manage and respond to potential threats.
| Chart name | Query example |
|---|---|
| Rare Firewall Rules Triggered |
|
| Top 10 Firewall Rules Triggered |
|
| Connections by Geo Location |
|
| Top Connection Destinations |
|
| Data Inflow by IP |
|
| Connections by Geo Location |
|
| Data Outflow by IP |
|
| Rare Firewall Rules Triggered |
|
| Top Connection sources |
|
| Blocked vs. Allowed Traffic |
|
| Top 10 Firewall Rules Triggered |
|
| Blocked vs. Allowed Traffic |
|
| Data Outflow by IP |
|
| Data Inflow by IP |
|
| Top Connection sources |
|
| Top Connection Destinations |
|
| Top 10 Blocked IPs |
|
| Top 10 Blocked IPs |
|
GDPR Data Governance
This dashboard provides visibility into data access across EU regions, including access trends, non-EU access attempts, and top geolocations. It helps monitor compliance with GDPR regulations, detect unauthorized data access, and ensure secure handling of EU data.
| Chart name | Query example |
|---|---|
| Privileged Accounts Accessing EU Resources |
|
| Weak TLS Version Distribution |
|
| Top 10 Non EU IPs Accessing EU Resources |
|
| Top 10 Users Accessing EU Resources |
|
| EU Data Access by Source Geolocation |
|
| Data Deletion and Purge Events on EU Resources Over Time |
|
| Weak Encryption On EU Resources Over Time |
|
| Data Deletion and Purge Events on EU Resources |
|
| Top 10 Privileged Accounts Accessing EU Resources |
|
| EU-Based DLP Events |
|
| Top 10 External Domains Receiving EU Data |
|
| Malware File Summary |
|
| EU-Based DLP Events Over Time |
|
| EU Data Access Events Over Time |
|
| Top 10 Policies Triggered |
|
| Unauthorized Access to EU Resources |
|
| Access to EU Resources from Non-EU Countries |
|
| Top 10 Non-EU Countries Accessing EU Data |
|
| Privileged Access to EU Resources Over Time |
|
| Threat Detection Over Time |
|
| Sensitive Data Access Events |
|
Google Workspace Alerts
This dashboard provides an overview of security events and potential threats, tracking critical alerts and trends related to user activity from workspace.
| Chart name | Query example |
|---|---|
| Top 10 High Severity Alerts |
|
| Top 10 Alerts |
|
| Alerts Over Time |
|
| Recent Alert Details |
|
| Alert by Severity |
|
| Top 10 Users by Alert Count |
|
Google Workspace Drive
This dashboard provides a comprehensive view of user activity and resource management. It highlights key security events, users, and access patterns across various locations, enabling security teams to ensure compliance and mitigate potential risks.
| Chart name | Query example |
|---|---|
| DLP Summary for Download Events |
|
| Download Events Over Time |
|
| Top 10 Users in Download Events |
|
| Resource Deletion Events Over Time |
|
| Top 10 Events |
|
| Resource Creation Events Over Time |
|
| Top 10 Locations |
|
| Source Geolocation Overview |
|
| DLP Summary for Upload Events |
|
| Events Over Time by Action |
|
| Top 10 Accessed Resources |
|
| Top 10 Users in Upload Events |
|
| Top 10 Users |
|
Google Workspace Identity Management
This dashboard provides an overview of user and group activities, offering insights into login patterns, modifications, and permission changes, while also tracking trends over time.
| Chart name | Query example |
|---|---|
| Group Modifications Events Over Time |
|
| User Deletion Events Over Time |
|
| Permission Changes Events Over Time |
|
| Successful vs. Failed Logins |
|
| Top 10 Admins Handling Management Tasks |
|
| Top 10 Failed User Login Trend |
|
| User Creation Events Over Time |
|
| Top 10 Successful User Login Trend |
|
Group Activity Summary
This dashboard provides a detailed view of user and group interactions, tracking distinct users, groups, and membership changes. It highlights the most active users and groups, group changes, and monitors group activity trends.
| Chart name | Query example |
|---|---|
| Groups Created Over Time |
|
| Top 10 Hosts by Group Management Event |
|
| Groups Created |
|
| Users Removed from Groups |
|
| Recent Groups Deleted |
|
| Blocked Group Events Over Time |
|
| Users Added to Admin Group |
|
| Recent Users Removed from Groups |
|
| Group Change Activity Count |
|
| Top 10 Blocked Users in Group Events |
|
| Groups Deleted |
|
| Recent Groups Created |
|
| Top 10 Active Hosts |
|
| Top 10 Users Deleting Groups |
|
| Top 10 Group Actions |
|
| Top 10 Users by Login Event |
|
| No. of Users Added to Groups |
|
| Top 10 Blocked Source IPs in Group Events |
|
| Unique Users in Login Events |
|
| Top 10 Source IPs Modifying Groups |
|
| Total Users Added to Admin Group |
|
| Group Activity Over Time |
|
| New Groups Added |
|
| Groups Deleted |
|
| Recent Users Added to Groups |
|
| Groups Modified Over Time |
|
| Recent Groups Modified |
|
| Users Removed from Groups |
|
| Top 10 Users Creating Groups |
|
| Top 10 Users Modifying Groups |
|
| Users Added to Admin Group |
|
| Group Change Activity Count |
|
| Users Added to Groups |
|
| Top 10 Group Actions |
|
| Top 10 Source IPs Deleting Groups |
|
| Count of Unique User Logins |
|
| Top 10 Source IPs Creating Groups |
|
| Top 10 Active Groups |
|
| No. of Users Removed from Groups |
|
| Groups Deleted Over Time |
|
| Top 10 Groups by Event Count |
|
| Top 10 Active User Logins |
|
| Users Added to Groups |
|
Group Management Audit
This is a dedicated dashboard for auditing the entire lifecycle of user groups. It helps ensure that group creations, modifications, and deletions are properly managed, preventing unintended access rights at scale.
| Chart name | Query example |
|---|---|
| Top 10 Users Creating Groups |
|
| Top 10 Source IPs Creating Groups |
|
| Top 10 Users Modifying Groups |
|
| Recent Group Modifications |
|
| Total Unique Groups Modified |
|
| Groups Deleted Over Time |
|
| Groups Created Over Time |
|
| Groups Modified Over Time |
|
| Group Events Over Time |
|
| Top 10 Source IPs Deleting Groups |
|
| Total Unique Groups Created |
|
| Recent Group Deletions |
|
| Top 10 Source IPs Modifying Groups |
|
| Top 10 Blocked Users in Group Events |
|
| Top 10 Users Deleting Groups |
|
| Recent Group Creations |
|
| Top 10 Blocked Source IPs in Group Events |
|
| Total Unique Groups Deleted |
|
HIPAA Dashboard
This dashboard provides real-time monitoring of security and compliance metrics
to ensure adherence to HIPAA regulations. It provides visibility into potential
risks, violations, and data access activities involving Protected Health
Information (PHI). This enables proactive risk management and helps maintain
the confidentiality, integrity, and availability of sensitive health data. This
dashboard uses the ePHI_assets.Hostname
data table to scope data according to
HIPAA standards. The charts on this dashboard don't load until the required data
tables are created.
| Chart name | Query example |
|---|---|
| Vulnerabilities by Severity |
|
| Permission Changes Over Time by Log Type |
|
| MFA Events Over Time by Action |
|
| Login Events Over Time by Action |
|
| Top 10 ePHI Hosts by DLP Violations |
|
| EDR Alerts Over Time by Severity |
|
| Backup Events Over Time by Action |
|
| Password Changes Over Time by Action |
|
| Recent Backup Events (Last 24 Hours) |
|
| Recent EDR Alerts (Last 24 Hours) |
|
| Recent User Account Creations (Last 24 Hours) |
|
| Weak Encrypted Communication Over Time by Log Type |
|
| Recent User Change Password (Last 24 Hours) |
|
| Top 10 SaaS Applications |
|
| Top 10 Key Operations |
|
Host Investigation
This dashboard provides a comprehensive overview of host activities and security events. Key widgets track network communication, authentication changes, malware, top events, and rare processes. It also monitors service and scheduled task creation, and potential security threats.
| Chart name | Query example |
|---|---|
| Top 10 Events |
|
| Events Trend Over Time |
|
| Malware and Intrusion |
|
| Network Communication Outbound Map |
|
| Rare Processes |
|
| Service Creation |
|
| Network Communication |
|
| Authentication and Changes |
|
| Network Communication Inbound Map |
|
| Scheduled Task Creation |
|
IAM Security Operations
This dashboard is a high-level overview for daily monitoring. It focuses on real-time anomalies, active threats, and high-risk events to enable rapid incident detection and response.
| Chart name | Query example |
|---|---|
| Recent Users Account Deleted |
|
| Privileged Account Login Failures & Successes |
|
| Total Unique Users Account Modified |
|
| Top 10 User Account Logins |
|
| Recent Roles Deleted |
|
| Top 10 Blocked Source IPs in User Events |
|
| First-Time Access from New Source |
|
| Top 10 User-Accessed Applications |
|
| User Lifecycle KPI |
|
| Top 10 Blocked Users in User Events |
|
| Password Changes Over Time |
|
| Top 10 Blocked Users in Role Events |
|
| Impossible Travel |
|
| Total Unique Users Account Deleted |
|
| Total Unique Users Account Created |
|
IDS / IPS Event Overview
This dashboard provides a comprehensive snapshot of security events detected by intrusion detection and prevention systems.
| Chart name | Query example |
|---|---|
| IDS / IPS Events by Categories |
|
| Top 10 IPs by Event Count |
|
| IDS / IPS Events by Destination |
|
| IDS / IPS Events by Source |
|
| Top IDS / IPS Events by Rule and Action |
|
| IDS / IPS Events over Time by Severity |
|
| Top 10 IDS / IPS High Severity Events |
|
| IDS / IPS Events by Signature |
|
ISO27001 - Organizational Controls
This dashboard provides visibility into organizational security controls and
compliance performance based on iso 27001 standards. It helps security teams
monitor control implementation, track audit results, and identify areas for improvement. By centralizing key compliance metrics, the dashboard supports ongoing alignment with ISO 27001
requirements and strengthens the organization's overall information security management. Note: this dashboard requires the use of filters.
| Chart name | Query example |
|---|---|
| DLP Violations by Severity |
|
| Top 10 DLP Rules |
|
| Recent Role Creations, Modifications, and Deletions |
|
| Recent Permission Changes |
|
| Blocked Network Traffic Over Time by Reason |
|
| User Events Over Time |
|
| Top 10 Applications Accessed |
|
| Top 10 Outbound IPs by Traffic Volume |
|
| Devices Over Time |
|
| Password Changes Over Time |
|
ISO27001 - Physical Controls
This dashboard centralizes data on compliance with physical security categories, offering security teams a clear view of control effectiveness. It presents key metrics on access control efficacy and removable media events, which are crucial for quickly identifying vulnerabilities and prioritizing remediation efforts. The dashboard enables data-driven decision-making to mitigate risks and continuously improve your organization's physical security posture in alignment with ISO 27001
standards.
| Chart name | Query example |
|---|---|
| Remote Access by Severity |
|
| Recent Removable Media Events |
|
| User Badge-Ins Over Time |
|
| Top 10 Recent User Badge-Ins |
|
| Top 10 Sensor Locations |
|
| Sensor Locations Over Time |
|
Living Off the Land Activity
This dashboard provides critical insights into potential misuse of trusted system tools and processes by attackers. This dashboard tracks and visualizes activity related to system utilities like rundll32
, regsvr32
, mshta.exe
, and others, which are commonly leveraged by advanced threats to evade detection.
| Chart name | Query example |
|---|---|
| Suspicious msiexec Execution |
|
| Suspicious mshta.exe Process Creation |
|
| Suspicious Execution of Regsvr32 |
|
| Outbound Connections Initiated by Rundll32.exe |
|
| Suspicious Execution of Rundll32 |
|
| Suspicious CertUtil Commands |
|
| Suspicious WMI Scripts |
|
| Suspicious Regsvr32 Network Connections |
|
MITRE ATT&CK Tagged Events
This dashboard provides an overview of detection activities based on the MITRE ATT&CK framework, tracking detections and highlighting trends to identify emerging threats. It helps an organization and security teams better understand their environment by showcasing and mapping tactics, techniques and procedures (TTPs), enhancing threat detection and response, and ensuring proactive defense against cyber threats.
| Chart name | Query example |
|---|---|
| New Tactics & Techniques - Last 7 Days |
|
| Techniques Trend Over Time |
|
| Top 10 Identified Techniques |
|
| Top 10 Identified Techniques |
|
| Tactics Trend Over Time |
|
| Tactics Trend Over Time |
|
| Total Vendor Alerts by Tactics |
|
| Tactics Identified by User |
|
| Techniques Identified by Hostname |
|
| Techniques Identified by Hostname |
|
| Tactics Identified by Hostname |
|
| Techniques Identified by User |
|
| Techniques Identified by User |
|
| Total Vendor Alerts by Tactics |
|
| New Tactics & Techniques - Last 7 Days |
|
| Tactics Identified by Hostname |
|
| Severity Distribution of MITRE Events |
|
| Techniques Trend Over Time |
|
| Events by Tactic and Technique |
|
| Tactics Identified by User |
|
Microsoft 365 - SharePoint & OneDrive
This dashboard offers a detailed view of user activity, data access, and security events across both platforms. It provides organizations with valuable insights to track file operations, access trends, and user behavior. This dashboard aids in identifying unauthorized access or unusual activity, such as unexpected login locations or anomalies in user patterns.
| Chart name | Query example |
|---|---|
| User Activities |
|
| Modification of Sharing Policies |
|
| Top 10 SharePoint Sites Accessed |
|
| Top 10 Active Users |
|
| Top 10 Privileged Account Activity |
|
| Top 10 File Operations |
|
| Geolocation Map on User Access |
|
| Top 10 Source IP Address |
|
| Activity Trends Over Time |
|
| Number of File Downloads Over Time |
|
| File Downloads |
|
Microsoft 365 Alerts
This dashboard provides an overview of security events and potential threats, tracking critical alerts and trends related to user activity.
| Chart name | Query example |
|---|---|
| Top 10 Users by Alerts |
|
| Top 10 Alerts |
|
| Top 10 High Severity Alerts |
|
| Recent Alert Details |
|
| Alerts Severity Distribution |
|
| Alerts over Time |
|
Mobile Device Management
This dashboard helps security teams monitor organizational mobile devices by providing insights into compliance, threat trends, severity distributions, and user activity to understand the overall security posture. It enables informed decision-making to address vulnerabilities, enforce security policies, and mitigate emerging threats effectively.
| Chart name | Query example |
|---|---|
| Devices with Outdated / Vulnerable OS Versions |
|
| Top 10 Modified Resources |
|
| OS Distribution |
|
| Top 10 Device Threats |
|
| Top 10 Locations of Devices |
|
| Non-Compliant Devices Over Time |
|
| Top 10 Users by Login Failure |
|
| Devices with Recent Threats Over Time |
|
| Patched Devices Over Time |
|
| Critical Devices Over Time |
|
| Detected Threats Over Time |
|
| Device Severity Distribution |
|
| Device Onboard/Offboard Over Time |
|
| Events Over Time |
|
Multi-Factor Authentication (MFA) Monitoring
This dashboard provides a detailed analysis of MFA implementation and effectiveness across your organization. It offers real-time and historical insights into MFA usage trends, failure alerts, and enrollment status. By monitoring these key aspects, the dashboard helps organizations identify potential vulnerabilities, track authentication performance, and ensure compliance with security protocols, ultimately strengthening overall access security and user management.
| Chart name | Query example |
|---|---|
| Okta MFA Bypass Detection |
|
| MFA Failure Rate |
|
| Blocked MFA Attempts by Reason |
|
| MFA Attempts Over Time |
|
| MFA Attempts by Location |
|
| MFA Attempts by Location |
|
| Top 5 Users by Failed MFA Attempts |
|
| MFA Usage Trends |
|
| Top 5 Applications Accessed via MFA |
|
| MFA Success Rate |
|
| MFA Success Rate |
|
| Top 5 Applications Accessed via MFA |
|
| Blocked MFA Attempts by Reason |
|
| MFA Enrollment Status |
|
| MFA Failure Rate |
|
| Okta MFA Bypass Detection |
|
| Top 5 Users by Failed MFA Attempts |
|
| MFA Attempts Over Time |
|
| MFA Failure Alerts |
|
| MFA Failure Alerts |
|
| MFA Enrollment Status |
|
| MFA Usage Trends |
|
NIST 800-53 - Access Control
This dashboard provides a comprehensive overview of access control activities aligned with NIST 800-53
standards. It tracks access trends across sources, policies, and geolocations to identify risks, streamline monitoring, and strengthen access control management. This dashboard uses the reference list nist_compliance_assets
to scope data to the NIST environment.
| Chart name | Query example |
|---|---|
| User Account Lockouts |
|
| Recent Failed Logins (Last 24 Hours) |
|
NIST 800-53 - Audit and Accountability
This dashboard provides a comprehensive overview of log management, aligned with NIST 800-53
standards, enabling you to effectively monitor and manage audit logs for security and compliance purposes.
| Chart name | Query example |
|---|---|
| Audit Log Clearing(Windows Events) |
|
NIST 800-53 - Identification & Authentication
This dashboard provides a comprehensive overview of identity and authentication activities, aligned with NIST 800-53
standards. It tracks key metrics such as password changes, account management, permission updates, and multi-factor authentication (MFA) activity. This tool helps you enforce compliance to identity and authentication processes, ensuring the protection of sensitive systems and data.
| Chart name | Query example |
|---|---|
| MFA Success Rate |
|
| Permission Changes Over Time |
|
| Top 10 Initiators Creating User Accounts |
|
| Top 10 Initiators Deleting User Accounts |
|
| Top 10 Initiators Creating Groups |
|
| User Events Over Time |
|
| Events Over Time |
|
| Recent Role Modifications |
|
| Recent Group Creations |
|
| Top 10 Initiators Deleting Roles |
|
| Recent User Account Deletions |
|
| Top 10 Initiators Deleting Groups |
|
| MFA Failure Rate |
|
| Recent Permission Changes |
|
| Recent Group Deletions |
|
| Top 10 Initiators Modifying Roles |
|
| Recent User Account Creations |
|
| Recent Role Deletions |
|
| Top 10 Initiators Creating Roles |
|
| Recent Users Account Modifications |
|
| Password Changes Over Time |
|
| Top 10 Initiators Modifying Groups |
|
| Recent Role Creations |
|
| MFA Enrollment Status |
|
| Top 10 Initiators Modifying User Accounts |
|
| Role Events Over Time |
|
| Recent Group Modifications |
|
| Group Events Over Time |
|
NIST 800-53 - Media Protection
This dashboard provides a comprehensive overview of media protection activities, aligned with NIST 800-53
standards. It tracks security events by action, and frequency, highlighting key trends such as frequently triggered rules, top hosts, IP addresses, and users. This tool helps you enforce compliance to protect sensitive media assets.
| Chart name | Query example |
|---|---|
| Top 10 Users by Action |
|
| Top 10 Source Hostnames by Action |
|
| Top 10 Vendor Alert Locations |
|
| Recent Vendor Alerts |
|
| Top 10 Vendor Alerts by Action |
|
| Top 10 Source IPs by Action |
|
| Events Over Time by Action |
|
NIST 800-53 - System and Communication Protection
This dashboard enhances security and compliance by providing insights into system and network defenses. It monitors EDR sensor activity, IDS/IPS events, DDOs and network traffic anomalies to detect potential threats, ensuring adherence to NIST security standards. It uses the reference list nist_compliance_assets
to scope data to the NIST environment.
| Chart name | Query example |
|---|---|
| IDS / IPS Events by Category |
|
| DDOS Activities |
|
| Network Traffic Over Time by Action |
|
| Inbound Blocked Traffic by Geolocation |
|
| USB Events |
|
| Network-based Malicious Activities |
|
| EDR Vendor Alerts |
|
| Weak Encrypted Communication Over Time by Log Type |
|
| Top 10 IDS / IPS Vendor Alert by Severity |
|
| Top 10 Hosts in EDR Events by Log Type |
|
| Outbound Blocked Traffic by Geolocation |
|
| Network traffic Over Time by Direction |
|
Network Traffic Overview
This dashboard offers real-time monitoring of cloud and on-premises network traffic by IP address, protocol, vendor, alert, and region, enabling effective analysis of traffic volume and potential issues.
| Chart name | Query example |
|---|---|
| Network Events |
|
| Top 10 Source IPs in Vendor Alerts |
|
| Top 10 Blocked Users |
|
| Top 10 Events by Bytes Sent |
|
| Vendor Alerts Over Time by Action |
|
| Events Over Time by Log Type |
|
| Top 10 Outbound IPs by Traffic Volume |
|
| Vendor alerts over time by Log Type |
|
| Top 10 Source IP Address |
|
| Top 10 Vendor Alerts |
|
| Distinct Destination IPs |
|
| Weak TLS Version Usage Over Time |
|
| Top 10 Users by Traffic Volume |
|
| Top 10 Applications by Bytes Sent |
|
| Inbound vs. Outbound Traffic Volume Over Time |
|
| Mean Bytes |
|
| Traffic Volume by IP Over Time |
|
| Top 10 Traffic Volume Source Locations |
|
| Events by Severity |
|
| Inbound Traffic Location Heatmap |
|
| Top 10 Services by Traffic Volume |
|
| Top 10 Ports by Traffic - Outbound |
|
| Distinct Source IPs |
|
| Traffic Volume by Log Type Over Time |
|
| Total Bytes Sent |
|
| Standard Deviation Bytes |
|
| Outbound Traffic Location Heatmap |
|
| Top 10 Blocked Source Ip to Destination IP |
|
| Top 10 Ports by Traffic - Inbound |
|
| Top 10 Blocked Countries |
|
| Top 10 Destination IP Address |
|
| Network Protocol Distribution Over Time |
|
| Top 10 Suspicious Target Files |
|
| Top 10 Users in Vendor Alerts |
|
| Top 10 URLs |
|
| Allowed vs. Blocked Network Traffic |
|
| Top 10 Hosts by Traffic Size |
|
| Target port by Protocol |
|
| Top 10 Allowed Connections |
|
| Inbound Traffic Over Time by Action |
|
| Average Bytes |
|
| Top 10 Blocked countries |
|
| Outbound Traffic Over Time by Action |
|
| Top 10 events category |
|
| Top 10 Inbound IPs by Traffic Volume |
|
| Top 10 Network Connections |
|
| Top 10 Blocked Source IP Address |
|
OT Security
This dashboard provides an in-depth view of security within an OT environment, allowing you to track and evaluate security events. It identifies trends, key assets, users, and services, while monitoring network and geographic activity. This enables you to prioritize threats, optimize response strategies, and enhance the security of OT systems.
| Chart name | Query example |
|---|---|
| Top 10 Non-OT Protocols by Log Type |
|
| Top 10 Assets Using Cleartext Protocol |
|
| Top 10 CVEs |
|
| OT Sniffers Over Time |
|
| Top 10 Entities Targeted by External Network |
|
| Vendor Alerts Over Time by Asset |
|
| Cleartext Protocol Distribution |
|
| Top 10 Vendor Alerts by User |
|
| Top 10 Entities Initiating External Networks |
|
| Top 10 Vendor Alerts by Severity |
|
| Application Protocols Over Time |
|
| New OT Assets |
|
| Vendor Alerts Over Time |
|
| Total New OT Assets |
|
| Top 10 Source Assets |
|
| Vendor Alerts by Action |
|
| Total OT Assets |
|
| Vendor Alerts Over Time by Log Type |
|
| Top 10 Vendor Alerts by Category |
|
PCI - Anti-Malware
This dashboard gives a view of Payment Card Industry (PCI) assets and active threat detections. It uses the reference list pci_assets
to scope data to the PCI environment.
Note: The charts in this dashboard don't load until the required reference lists are created.
| Chart name | Query example |
|---|---|
| Blocked Events by Type |
|
| Allowed Events By User |
|
| Events Summary by Action |
|
| Total Events |
|
| Total EDR Alerts by Severity |
|
| Top 10 Event Types |
|
| Total EDR Alerts |
|
| EDR Alerts by Tactics |
|
| Total EDR Alerts Over Time |
|
| Events by Severity |
|
| Other Events |
|
| Total Events by Type Over Time |
|
| Allowed Events By IP Address |
|
| Event Actions by Log Type |
|
| Blocked Events By IP Address |
|
| Blocked Events By User |
|
| Quarantined Events |
|
| Top 10 Endpoints by Location |
|
| Blocked Events |
|
| Total Events Over Time |
|
| Allowed Events by Type |
|
| Allowed Events |
|
PCI - Data Encryption
This dashboard provides an overview of encryption practices across PCI assets. This dashboard enhances visibility into encryption key usage, offering insights into Key Management Service (KMS) activities, Azure key vault logs, and Akeyless vault logs. It uses reference list pci_network_ranges
to scope data to the PCI environment.
| Chart name | Query example |
|---|---|
| Key Rotation more than 30 days ago |
|
| Key Decrypt Failed |
|
| Key Deletion |
|
| Weak Encrypted / Unencrypted Communication |
|
| Weak Encrypted/ Unencrypted Communication by Port |
|
| Key Rotated |
|
| Key Enabled |
|
| Key Decrypt Success |
|
| New Key |
|
| Weak Encrypted / Unencrypted Communication Over Time |
|
| Key Disabled for more than 30 days |
|
| Weak Encrypted/ Unencrypted Communication Top 10 Users |
|
| Top 10 Key Operations |
|
| Weak Encrypted / Unencrypted Communication Top 10 Hosts |
|
PCI - EDR Alerts Overview
This dashboard offers a detailed view of critical elements such as assets, events, and active threat detections. It uses the reference list pci_assets
to scope data to the PCI environment.
| Chart name | Query example |
|---|---|
| Number of EDR Sensors |
|
| Top 10 Techniques |
|
| Severity based on EDR Alerts |
|
| Total EDR Alerts Over Time |
|
| Top 10 Users based on EDR Alerts |
|
| Top 10 Tactics |
|
| Top 10 EDR Alerts |
|
| Top 10 Hosts based on EDR Alerts |
|
| Active EDR Sensors |
|
| Total EDR Alerts |
|
PCI - Identity and Access
This dashboard provides a detailed, real-time overview of access management and identity-related activities to support PCI-DSS compliance. It consolidates key metrics and insights, including user access permissions, password changes, and authentication events. It uses the reference list pci_assets
to scope data to the PCI environment.
| Chart name | Query example |
|---|---|
| Accounts with password never expires |
|
| User Accounts Change Permissions |
|
| User Accounts Created |
|
| User Accounts Created |
|
| User Accounts Deleted |
|
| Password Changes Attempts by Top 10 User |
|
| User Accounts Deleted |
|
| User Accounts Change Permissions |
|
| Password Changes over time |
|
PCI - Monitoring and Testing
This dashboard provides monitoring and tracking of access to payment cardholder data within the PCI environment. It utilizes the reference lists pci_assets
and default_users
to scope data.
| Chart name | Query example |
|---|---|
| Events Over Time by Event Type |
|
| Top Resource Access by Source |
|
| Audit Logs Access |
|
| Administrative Access to Systems |
|
| Top 10 Users by Action |
|
| Inactive Users (Last 7 days) |
|
| Log Clear Detection (Windows Events) |
|
| Audit Policy Changes |
|
| Audit Policy Changes |
|
| Failed Events |
|
| Total Failed Events by Source IP Address |
|
| Total Events by Event Type |
|
PCI - Network
This dashboard provides insights to network performance of a particular interface (source or destination), real-time visibility to top network activities, and traffic trends and analysis. It uses the reference list pci_network_ranges
to scope data to the PCI environment.
| Chart name | Query example |
|---|---|
| Traffic Total Count |
|
| Top 10 Destination Traffic by Location |
|
| Traffic by Top 10 Destinations |
|
| Top 10 Triggered Network Rules |
|
| Traffic by Top 10 Destination Ports |
|
| Top 10 Network Activities |
|
| Port Activity Summary |
|
| Traffic by Top 10 Protocols |
|
| Network Data Processed Over Time (Sent Bytes) |
|
| Network Data Processed Over Time (Received Bytes) |
|
| Network Traffic Over Time |
|
| Traffic by Top 10 Source Ports |
|
| Network Asset Count |
|
| Traffic Over Time by Protocol |
|
| Traffic Over Time by Action |
|
| Traffic by Top 10 Sources |
|
PCI - Patch Management
This dashboard provides a comprehensive view of the patch management lifecycle, enabling organizations to monitor and manage their system updates effectively. It uses the reference lists patch_updates
and pci_assets
to scope data to the PCI environment.
| Chart name | Query example |
|---|---|
| Top 10 Successful Installations by Hosts |
|
| Failed Installations Over Time |
|
| Systems with Available Updates |
|
| Cancelled installations Over Time |
|
| Failed Downloads Over Time |
|
| Successful Downloads Over Time |
|
| Started Downloads Over Time |
|
| Latest Updates Installed |
|
| Successful Installations over Time |
|
| Top 10 Failed Installations by Hosts |
|
PCI - Secure Configurations
This dashboard provides real-time monitoring of secure configuration practices. It tracks key metrics, highlights risks, and helps maintain critical configurations. It uses the reference lists pci_assets
and default_users
to scope data to the PCI environment.
| Chart name | Query example |
|---|---|
| Failed Login Attempts |
|
| Total Policy Changes |
|
| Default Account Usage Over Time |
|
| Top 10 Default Usernames |
|
| Failed Login Attempts Over Time |
|
| Policy Changes by User |
|
| Failed Login Attempts by top 10 Host |
|
| Failed Login Attempts by User |
|
| Default Account Usage by Hostname |
|
| Total Default Username Authentication |
|
| Policy Changes by Log Sources |
|
| Policy Changes Over Time |
|
| Default Usernames Authentication Summary |
|
PCI - Vulnerability Management
This dashboard provides real-time monitoring and tracking of vulnerabilities. It supports broader compliance efforts, helping to identify, assess, and manage risks to maintain secure payment environments while streamlining reporting. It uses the reference lists pci_assets
and pci_network_ranges
to scope data to the PCI environment.
| Chart name | Query example |
|---|---|
| Vulnerabilities by Age |
|
| Top 10 Vulnerable Hosts |
|
| Top 10 Vulnerabilities |
|
| New Vulnerabilities |
|
| Total Vulnerabilities |
|
| Vulnerable Systems |
|
| Vulnerabilities by Severity |
|
| Vulnerable Systems (Percentage) |
|
| Vulnerability Per System |
|
Password Change Monitoring Dashboard
This dashboard tracks and logs password changes and provides a comprehensive view of password change events, including date and time of password change. It visualizes trends, identifies risks such as suspicious IP addresses, users, and locations, and helps detect and respond to potential security incidents such as unauthorized password changes.
| Chart name | Query example |
|---|---|
| Top 10 Source IPs by User |
|
| Top 10 Password Reset |
|
| Events Over Time by Log Type |
|
| Events By Action |
|
| Source Geolocation Heatmap |
|
| Top 10 Users by action |
|
| Top 10 Event Description |
|
| Recent User Change Password (24 hours) |
|
| Events By Severity |
|
Phishing Monitoring
This dashboard provides insights into phishing threats, email security, and attack trends. It offers visibility to the security team into phishing attempts, allowing teams to monitor malicious email activity, identify suspicious senders and targeted users, and flag potentially harmful indicators.
| Chart name | Query example |
|---|---|
| Top 10 Users in Vendor Alerts |
|
| Top 10 Phishing URLs Accessed |
|
| Top 10 Phishing Email Subjects |
|
| Events by Action |
|
| Events Over Time by Log Type |
|
| Total Phishing Events Detected |
|
| Top 10 Associated Domains |
|
| Vendor Alerts Over Time by Action |
|
| Recent Phishing Events |
|
| Top 10 Vendor Alerts |
|
| Top 10 Threat Names |
|
| Events Over Time by Action |
|
| Top 10 Phishing Email Senders |
|
| Phishing File Details |
|
| Events by File type |
|
| Vendor Alerts Over Time by Log Type |
|
| Top 10 Phishing URLs |
|
| Top 10 Phishing Email Recipients |
|
| Source Geolocation Overview |
|
| Events by Severity |
|
Port Scanning Detection
This dashboard provides insights into port scanning activities and other related network reconnaissance techniques that may indicate potential threats or malicious activity within the network infrastructure. By tracking and visualizing this type of behavior, it enables you to detect, investigate, and mitigate any unauthorized or suspicious network access attempts.
| Chart name | Query example |
|---|---|
| Events Over Time by Log Type |
|
| Recent Failed Connection Attempts to Standard Ports |
|
| Severity Distribution |
|
| Port Scan Events Over Time by User |
|
| Top 10 Destination IPs |
|
| Recent Port Scan Events |
|
| Top 10 Source Countries |
|
| Top 10 Targeted Internal Subnets |
|
| Recent Failed Connection Attempts to Non-Standard Ports |
|
| Top 10 Targeted Ports |
|
| Top 10 Port Scan Sources |
|
| Top 10 Source IPs |
|
| Port/IP Ratio |
|
| Protocol Distribution |
|
| Port Scan Events Over Time by Hostname |
|
Port and Protocol Overview
This dashboard offers real-time and historical insights into network port activity and protocol usage. It identifies active and inactive ports, potential vulnerabilities, and helps optimize network security and performance while ensuring policy compliance.
| Chart name | Query example |
|---|---|
| New Port Activity - Inbound |
|
| Allowed vs Blocked Ports Traffic |
|
| Top 10 Ports by Traffic - Outbound |
|
| Protocol Distribution |
|
| Protocol Distribution |
|
| Traffic on Commonly Prohibited Ports |
|
| Top 10 Ports by Traffic - Inbound |
|
| Traffic on Commonly Prohibited Ports |
|
| Top 10 Ports by Traffic - Outbound |
|
| Allowed vs Blocked Ports Traffic |
|
| Top 10 Ports by Traffic - Inbound |
|
| New Port Activity - Inbound |
|
PowerShell
This dashboard is designed to analyze and monitor Powershell activity within your organization. It provides insights into command execution, user interactions, and potential security risks. By aggregating and visualizing this data, the dashboard aids in identifying potential issues, tracking threats, and enhancing overall security.
| Chart name | Query example |
|---|---|
| Powershell Execution by Process Event Type |
|
| Least Common File Paths |
|
| Least Common Hosts |
|
| Least Common Command Lines |
|
| Least Common Command Lines |
|
| Top 10 Users |
|
| PowerShell Events by Security Result Action |
|
| PowerShell Events by Security Result Action |
|
| Least Common Users |
|
| PowerShell Outbound Network Connections |
|
| PowerShell Outbound Network Connections |
|
| Powershell Activity Summary |
|
| Top 10 Command Lines |
|
| PowerShell Events by Severity |
|
| Powershell Execution by Process Event Type |
|
| Char Variable Obfuscation |
|
| Top 10 Hosts |
|
| Top 10 Users |
|
| File Downloads via PowerShell |
|
| Top 10 Event Types Containing PowerShell |
|
| Powershell Activity Summary |
|
| Top 10 Command Lines |
|
| Least Common Users |
|
| Top 10 Hosts |
|
| Top 10 Event Types Containing PowerShell |
|
| Least Common File Paths |
|
| Powershell Execution by Process Event Type |
|
| Top 10 File Paths |
|
| Char Variable Obfuscation |
|
| File Downloads via PowerShell |
|
| Powershell Execution by Process Event Type |
|
| PowerShell Events by Severity |
|
| Top 10 File Paths |
|
| Least Common Hosts |
|
Privileged Access Management
This dashboard tracks privileged access activities, identifying sources like users, hostnames, and IP addresses, while highlighting key assets. It helps security teams monitor access trends and manage risks, ensuring only authorized individuals access sensitive systems and data.
| Chart name | Query example |
|---|---|
| Top 10 Administrators |
|
| Top 10 Assets |
|
| Events Over Time |
|
| Top 10 User Accounts |
|
| Event Types Distribution |
|
| Top 10 Targeted Hostnames |
|
| Top 10 Source IPs |
|
| Top 10 Source Usernames |
|
Process Event Summary
This dashboard gives you a comprehensive view of network activity by collecting and visualizing data on various process occurrences, hosts, users, and events. It highlights key metrics, charts, and anomalies to provide essential insights into event frequency and process performance. It is useful for proactively monitoring system health, detecting potential security threats through anomalous behavior, and identifying areas needing efficiency improvements.
| Chart name | Query example |
|---|---|
| Total Powershell Events |
|
| Top 10 Parent Processes |
|
| Top 10 Users |
|
| Total Command Shell Events |
|
| Total Distinct Users |
|
| Total Blocked Events |
|
| Total Powershell Events |
|
| Top 10 Powershell Events |
|
| Top 10 Hashes |
|
| Process Events |
|
| Top 10 Shell Commands by User |
|
| Process Events Over Time |
|
| Top 10 Hostnames |
|
| Top 10 Users |
|
| Process Termination Events Over Time |
|
| Total Blocked Events |
|
| Total Distinct Users |
|
| Total Process Events |
|
| Top 10 Hosts |
|
| Total Process Events |
|
| Total Distinct Hosts |
|
| Total Distinct Hostnames |
|
| Total Command Shell Events |
|
| Event Type Distribution |
|
| Recent Process Events |
|
| Top 10 Command Shell Events |
|
Ransomware Spotlight Monitoring
This dashboard provides a comprehensive view of ransomware-related activity detected by various security tools and data sources. It helps security teams quickly identify and respond to ransomware threats by highlighting the recent events, affected devices, and sources of detection.
| Chart name | Query example |
|---|---|
| Recent Ransomware Email Events by URLs/Attachments |
|
| Recent Ransomware VM Events |
|
| Recent Ransomware DLP Events |
|
| Recent Endpoint Ransomware Events |
|
| Top 10 Ransomware Log Sources |
|
| Ransomware Events Over Time by Product |
|
| Recent Ransomware NDR Events |
|
| Recent Ransomware Events by Hostname |
|
Role & Permission Audit
This dashboard is a deep-dive dashboard for auditing the management of roles and direct resource permissions.
| Chart name | Query example |
|---|---|
| Top 10 Users Creating Roles |
|
| Top 10 Users Changing Resource Permissions |
|
| Top 10 Users Modifying Roles |
|
| Recent Roles Created |
|
| Top 10 Resources with Changed Permissions |
|
| Top 10 Blocked Source IPs in Role Events |
|
| Resource Permissions Changed Over Time |
|
| IAM Actions Over Time |
|
| Total Roles Modified |
|
| Top 10 Source IPs Modifying Roles |
|
| Roles Deleted Over Time |
|
| Activity on Critical Roles |
|
| Total Roles Created |
|
| Roles Created Over Time |
|
| Recent Roles Modified |
|
| Top 10 Source IPS Creating Roles |
|
| Role Lifecycle KPI |
|
| Roles Modified Over Time |
|
| Top 10 Source IPs Changing Resource Permissions |
|
| Total Roles Deleted |
|
| Top 10 Source IPs Deleting Roles |
|
| Top 10 Users Deleting Roles |
|
SMB Enumeration
This dashboard provides you with actionable insights into SMB-related activities, including enumeration trends, authentication attempts, and access patterns across users and IP addresses. By identifying suspicious behaviors and potential threats, it helps mitigate risks effectively.
| Chart name | Query example |
|---|---|
| Top 10 SMB Enumeration Attempts by User |
|
| Recent Failed SMB Authentication Attempts |
|
| SMB Enumeration Attempts Protocol Distribution |
|
| Enumeration Tools Detected Distribution |
|
| Top 10 Targeted IPs in SMB Enumeration |
|
| SMB Enumeration Status Distribution |
|
| Source IPs Over Time |
|
| SMB Commands Over Time |
|
| Top 10 Source IPs |
|
| Average Enumeration Rate |
|
| Top 10 Commands Used in SMB Enumeration |
|
| SMB Enumeration Detections Over Time |
|
| SMB Authentication Status Distribution |
|
SecOps Audit & Activity Monitoring
This dashboard provides essential insights into security posture, tracks events, user activities, and blocked actions within Chronicle Google APIs.
| Chart name | Query example |
|---|---|
| Events Over Time |
|
| Top 10 Event Types |
|
| Recent Blocked Actions |
|
| Top 10 Source IPs by Event Type |
|
| Blocked Events Over Time |
|
| Off Hours Unusual Events |
|
| Recent Risky Actions |
|
| Top 10 Users by Risky Action |
|
| Top 10 Users by Event Type |
|
| Blocked SecOps Events by Location |
|
| Action by Event Types: Allow vs. Block |
|
| Off Hours Unusual Actions by Category |
|
SecOps Log Monitoring
This dashboard provides insights into Log Data Management, highlighting ingestion latency, and component status. It helps you optimize performance, reduce data loss, and enhance security monitoring.
| Chart name | Query example |
|---|---|
| Average Log Ingestion Time by Log Type |
|
Security Posture Management
This dashboard provides a real-time overview of your organization's security status, highlighting threats, incidents, and vulnerabilities. It includes detections, security, and system update summary and asset monitoring, enabling security teams to assess risks and threat posture and implement remediation strategies effectively. This centralized view helps enhance overall security posture and streamline incident response.
Service Account Overview
This dashboard helps security teams and administrators monitor service account activity by providing insights into usage patterns, login attempts, and account modifications. It enables informed decision-making to identify security risks, address vulnerabilities, and ensure system integrity. Note: use the available filters to narrow down the results as required.
| Chart name | Query example |
|---|---|
| Top 10 Actions |
|
| Recent Permissions Modified |
|
| Successful Logins Over Time |
|
| Top 10 User Permissions Modified |
|
| Recent Password Changes |
|
| Service Accounts Deleted Over Time |
|
| Failed Logins Over Time |
|
| Usage Over Time |
|
| Recent Service Accounts Deleted |
|
| Top 10 Service Accounts by Login |
|
| Recent Service Accounts Created |
|
| Top 10 Service Accounts |
|
| Service Accounts Created Over Time |
|
| High Volume Kerberos Service Ticket Requests |
|
| Top 10 Source IPs by Failed Login |
|
| Top 10 Source IPs by Interactive Login |
|
| Interactive Logins Over Time |
|
| Password Changes Over Time |
|
Single Sign-On (SSO) Monitoring
This dashboard helps security teams track sso activity, detect unauthorized access, and optimize authentication to improve security and ensure compliance.
| Chart name | Query example |
|---|---|
| SSO Security Alerts |
|
| SSO Logins Over Time by Action |
|
| Unauthorized SSO Access |
|
| SSO Success vs. Failure Rate |
|
| Failed Login Attempts by User |
|
| SSO Events Over Time by Severity |
|
| Total SSO Logins |
|
| SSO Activity Logs |
|
| SSO Logins by Top 10 Application |
|
| SSO Usage Trend |
|
| Unauthorized SSO Access |
|
| SSO Anomalous Login Locations |
|
| Source Geolocation Overview |
|
| Top 10 Users by Logins |
|
| Top 10 Applications by Failed Login |
|
| Top 10 Vendor Alerts |
|
Sysmon Monitoring
This dashboard is used to analyze and monitor logs generated by sysmon. It provides insights into system activity, including process creations, network connections, and file changes. By aggregating and visualizing this data, the dashboard helps security analysts identify suspicious behavior, track potential threats, and respond accordingly.
| Chart name | Query example |
|---|---|
| Recent Service Events |
|
| Top 10 Hosts |
|
| Top 10 Sysmon Event IDs |
|
| Autorun Registry Changes Over Time |
|
| Recent WMI Events |
|
| Image Load Events Over Time by Signature Status |
|
| Event Type Distribution |
|
| Distinct Hosts |
|
| Top 10 Command Lines |
|
| Top 10 Processes Initiating Network Connection |
|
| Event Types Breakdown |
|
| Top 10 Files Created |
|
| Top 10 DNS Queried Domains by Source Process |
|
| Distinct Users |
|
| Top 10 Hosts |
|
| Top 10 Parent Processes |
|
| Top 10 Users |
|
| Process Access Events with Injection Rights Over Time |
|
| Total Sysmon Events |
|
| Top 10 Processes |
|
| Top 10 Processes |
|
| Top 10 Command Lines |
|
| Top 10 Sysmon Event IDs |
|
| Driver Load Events Over Time by Signature Status |
|
| Sysmon Events Trend |
|
| Top 10 Processes Initiating Network Connection |
|
| Top 10 Files Created |
|
| Top 10 Users |
|
| Total Sysmon Events |
|
| Total Distinct Hosts |
|
| Sysmon Events Over Time |
|
| Top 10 Modified Registry Keys |
|
| Total Distinct Users |
|
| Top 10 Parent Processes |
|
User Lifecycle Audit
This dashboard is a detailed dashboard for security managers and auditors to review user account management activities. It provides a comprehensive view of the user lifecycle, helping ensure that provisioning and de-provisioning policies are followed correctly.
| Chart name | Query example |
|---|---|
| Top 10 Source IPs Creating Users |
|
| Recent Users Account Created |
|
| Users Deleted Over Time |
|
| Activity from Disabled or Deleted Accounts |
|
| Top 10 Source IPs Deleting Users |
|
| Top 10 Users Modifying Users |
|
| User Events Over Time |
|
| Users Created Over Time |
|
| Recent Users Account Modified |
|
| Users Modified Over Time |
|
| Top 10 Users Deleting Users |
|
| Top 10 Source IPs Modifying Users |
|
| Top 10 Users Creating Users |
|
User Sign In Overview
This dashboard provides a comprehensive analysis of authentication activities, helping you identify and monitor sign-in events. This helps you detect potentially risky users, analyze sign-in statuses and trends, and understand geographical activity and associated hosts. You can also investigate unusual login behaviors, respond to potential security breaches, and maintain robust security through continuous monitoring and proactive threat detection.
| Chart name | Query example |
|---|---|
| Sign Ins by Country |
|
| Number of Successful Logins in the Past Day |
|
| Top 10 IPs by Sign In Status |
|
| Top 10 Src/Dest Talkers Over the Past Day - Bytes |
|
| Top 10 Applications by Sign Ins |
|
| Sign-ins by Application |
|
| Top 10 Source Target Pair by Event Count |
|
| Number of Successful Sign Ins |
|
| Sign-ins by Status |
|
| Top 10 Users by Failed Sign Ins |
|
| Users by Sign In Status |
|
| Sign In Location Map |
|
| Sign Ins by Status Over Time |
|
| Hostnames by Sign In Status |
|
| Abu Event Count by Target IP |
|
| Sign Ins by Application |
|
| Top 10 IPs by Failed Sign Ins |
|
| Top 5 Src/Dest Talkers Over the Past Day |
|
| Top 10 Hostnames by Successful Sign Ins |
|
| Credential Access Sign In Events |
|
| Number of Failed Sign Ins |
|
| IPs by Sign In Status |
|
| Failed Logins by Count (Last 24 Hours) |
|
| Top 10 IPs by Successful Sign Ins |
|
| Top 10 Countries by Sign Ins |
|
| Event Count by Log Type by Date |
|
| Sign Ins by Status |
|
| Top 10 Hostnames by Failed Sign Ins |
|
| Top 10 Src/Dest Talkers Over the Past Day |
|
| Initial Access Sign In Events |
|
| Top 10 Users by Sign In Status |
|
| Login Failure Rate |
|
| Top 10 Users by Successful Sign Ins |
|
VPN Activity Monitoring
This dashboard provides insights into VPN events as they relate to security.
| Chart name | Query example |
|---|---|
| Geographical Connection Sources |
|
| Top 10 Failed VPN Attempts By User and IP |
|
| VPN Usage Trends |
|
| VPN Bandwidth Usage over Time |
|
| VPN Usage Trends |
|
| Source Platform Distribution |
|
| Top 10 VPN Users by Event Count |
|
| Top 10 Target IPs |
|
| VPN Bandwidth Usage over Time |
|
| Active VPN Connections |
|
| Geographical Connection Sources |
|
| Top 10 Failed VPN Attempts By User and IP |
|
| Source Platform Distribution |
|
| Active VPN Connections |
|
| VPN Connection Success vs. Failure |
|
| VPN Connection Success vs. Failure |
|
| Top 10 VPN Users by Event Count |
|
| Top 10 Target IPs |
|
Web Application Firewall (WAF) Monitoring
This dashboard is designed to monitor and analyze web application firewall activity to enhance security and threat management. It provides real-time insights into web application security by tracking various metrics and events related to WAF operations, helping you effectively manage and respond to potential web-based threats.
| Chart name | Query example |
|---|---|
| Anomalous Traffic Detection |
|
| Top 10 WAF Rule Hits |
|
| Top 10 Source IPs |
|
| Blocked vs. Allowed Requests |
|
| Blocked vs. Allowed Requests |
|
| Geolocation of Attacks |
|
| Top 10 Source IPs |
|
| Top 10 Attack Types |
|
| Anomalous Traffic Detection |
|
| Top 10 Attack Types |
|
| Geolocation of Attacks |
|
| Top 10 URL Hits |
|
| Top 10 WAF Rule Hits |
|
| Top 10 URL Hits |
|
Web Center Overview
This dashboard monitors and analyzes web traffic patterns and user activity across the network. It provides insights into the top user agents, sources, destinations, and URLs, helping you track usage and detect potential risks.
| Chart name | Query example |
|---|---|
| Weak TLS Version Usage Over Time |
|
| TLS Cipher Distribution |
|
| Top 10 URLs |
|
| Least Common URLs |
|
| Unencrypted Communication Distribution |
|
| Events Over Time By HTTP Method |
|
| Top 10 Destination IPs |
|
| Top 10 Web Categories |
|
| Top 10 Users by HTTP Method |
|
| Top 10 HTTP User Agents |
|
| Top 10 Source IPs |
|
| Events Over Time By HTTP Method |
|
| Top 10 Users by Downloaded Bytes |
|
| Top 10 Users |
|
| Least Common URLs |
|
| Top 10 URLs |
|
| Top 10 Destination IPs |
|
| Top 10 HTTP User Agents |
|
| Top 10 Countries by Blocked URL |
|
| Events Over Time By HTTP Response Code |
|
| Blocked URL Based on Location |
|
| Top 10 Blocked URLs |
|
| Events Over Time By HTTP Response Code |
|
| Top 10 Blocked URLs |
|
| Web Failure Rate |
|
| Top 10 Web Categories |
|
| Blocked HTTP Events by Location |
|
| Top 10 Principal IPs |
|
| Top 10 Users |
|
| Top 10 Users by Uploaded Bytes |
|
Windows Security Overview
This dashboard analyzes user and system activities such as account management, login patterns, threat details, and configuration changes to provide a comprehensive view of Windows security posture and enhance threat detection and response capabilities.
| Chart name | Query example |
|---|---|
| Recent Scheduled Tasks Created |
|
| Successful vs Failed Logon Over Time |
|
| User Account Deletion |
|
| Top 10 User Accounts by Logon Failures |
|
| Distribution of Alerts by Host (Defender ATP) |
|
| Windows Defender ATP Threats |
|
| Threat Action Distribution |
|
| Security Event Log Cleared |
|
| Endpoint Protection Status Over Time (Defender Antivirus) |
|
| Account Creations & Deletions Over Time |
|
| Recent Audit Policy Changes |
|
| Threat Detections Over Time |
|
| Account Lockout Summary |
|
| Privileged Group Modifications |
|
| Recent Services Installed |
|
| Threat Detection Summary |
|
| Top 10 Threat File path |
|
| Endpoint Protection Summary (Defender Antivirus) |
|
| Logon Type Distribution |
|
| Top Processes Spawned on Servers (Windows Sysmon) |
|
| Distinct Remote Logon Countries |
|
| Antivirus Version Distribution (Defender Antivirus) |
|
| User Account Creation |
|
Wireless Network Security
This dashboard offers insights into network activity and security, including authentication distributions, failed logins, rogue AP detections, and client connection behavior. It helps track security events by severity, identify suspicious ids, and optimize network performance for proactive risk management.
| Chart name | Query example |
|---|---|
| Rogue Access Points Detections |
|
| Top 10 Authentication Types by Action |
|
| Top 10 SSIDs by Source MAC(Cisco Meraki) |
|
| Top 10 Access Point by Source MAC |
|
| Top 10 Event Types by Action |
|
| Top 10 MAC Address by Failed Authentication |
|
| Recent Failed Authentication (Last 24 Hours) |
|
| Total Source Devices |
|
| Top 10 Descriptions |
|
| Top 10 Client IPs Detected on Rogue Access Points |
|
| Authentication Type Distribution |
|
| Ad-Hoc Network Activity Detected (CISCO MERAKI) |
|
| Suspicious Wireless Activities |
|
| SSIDs by Failed Authentications(Cisco Meraki) |
|
| Severity Distribution |
|
| Rogue Access Point Detections Count |
|
| Source Geolocation Overview |
|
Need more help? Get answers from Community members and Google SecOps professionals.

