Start a conversation

Understanding the Use of Various Tabs Within the LanGuard Dashboard

Overview

The GFI LanGuard dashboard is made up of multiple tabs with different views, which enable real-time monitoring of scan targets and allow to perform instant remedial and reporting operations. This article contains information explaining the use of each tab within the LanGuard dashboard.

Introduction

The LanGuard dashboard consists of various tabs that allow users to manage their devices and groups efficiently.

mceclip2.png

Each tab represents a Dashboard view and allows monitoring and managing a device or group selected in the Computer Tree. The available views are:


 

Description

Overview Tab

The Overview tab provides a quick glance at the Vulnerability level of the selected device or group in the Computer Tree. Essentially it is a graphical representation of the security level/vulnerability level of a single computer, domain, or entire network.

However, this tab does not share the specific causes of these issues and only flags them here for further investigation. Settings of these alerts can be modified under the Security Sensors window.

mceclip6.png

Note: By default, the LanGuard dashboard always opens with the Overview tab.

When a computer, group, or domain is selected, the results related to the selection are automatically updated in the dashboard. Below is a description of each section found in the dashboard:

Section Description
Network security level This rating indicates the vulnerability level of a computer/network, depending on the number and type of vulnerabilities and/or missing patches found. A high vulnerability level is a result of vulnerabilities and/or missing patches whose average severity is categorized as high.
Computer vulnerability distribution This chart is available only when selecting a domain or a workgroup, and displays the distribution of vulnerabilities on your network. This chart enables you to determine how many computers have high, medium, and low vulnerability rating.
Most vulnerable computers This list is available only when selecting a domain or a workgroup, and shows the most vulnerable computers discovered during the scan. The icon color on the left indicates the vulnerability level.
Agent Status

This rating indicates the vulnerability level of a computer/network, depending on the number and type of vulnerabilities and/or missing patches found. A high vulnerability level is a result of vulnerabilities and/or missing patches whose average severity is categorized as high.

  • Not installed - Agent is not installed on the target machine.
  • Pending installation - Installation is pending. A status can be pending when the machine is offline or the agent is being installed.
  • Pending uninstall - Uninstallation is pending. A status can be pending when the machine is offline or the agent is being uninstalled.
  • Installed - Agent is installed on the target machine.
  •  Relay Agent Installed - The selected computers are relay agents.
Audit status This chart is available only when selecting a domain or workgroup and enables you to identify how many audits have been performed on your network grouped by time.
Vulnerability trends over time When a domain or workgroup is selected, this section displays a line graph showing the change of vulnerability level over time grouped by computer count. When a single computer is selected, this section displays a graph showing the change of vulnerability level over time for the selected computer.
Computers by network role This chart is available only when selecting a domain or a workgroup and displays the number of audited computers, grouped by network role. Amongst other roles, this graph identifies the number of servers and workstations per selected domain.
Computers by operating system This chart is available only when selecting a domain or a workgroup and displays the number of audited computers, grouped by the installed operating system.
Computer details This section is available when selecting a single computer and enables you to view the selected computer details.
Scan activity This line graph is available only when selecting a single computer and enables you to view the number of scans/audits performed on the selected computer. In addition, enables you to verify if scheduled scans are being performed.
Remediation Activity This line graph is available only when selecting a single computer and enables you to view the number of remediation activities performed on the selected computer. In addition, this graph enables you to verify that auto-remediation is performed.
Top 5 Issues to Address This section is available only when selecting a single computer, and displays the top five issues to address for the selected computer.
Results statistics This section is available only when selecting a single computer and displays an overview of the audit result. Amongst others, the result enables you to identify the number of missing patches, number of installed applications, open ports, and running services.
Security Sensors This section enables you to identify issues at a glance. Click a sensor to navigate and display issues and vulnerabilities for a specific computer or group. Sensors enable you to identify:
  • Missing Software Updates
  • Missing service packs
  • Vulnerabilities
  • Firewall Issues
  • Unauthorized Applications
  • Audit Status
  • Credentials setup
  • Malware Protection Issues
  • Agent Health Issues.

 Back to top


 

Computers Tab

The Computers tab provides a thorough overview of each machine and its current audit results in LanGuard. This tab is mostly used for troubleshooting credential issues across domains. It helps to trace machines whose functionality is affected due to incorrect use of credentials.

mceclip7.png

From the drop-down list, select one of the options described below:

Section Description
Agent Details Select this option to view the agent status. This option enables you to identify if an agent is installed on a computer and if yes, displays the type of credentials being used by the agent.
Vulnerabilities View the number of vulnerabilities found on a computer grouped by severity. The severity of vulnerability can be:
  • High
  • Medium
  • Low
  • Potential.
Patching status View the number of:
  • Missing Security/non-Security Updates
  • Missing Service Packs and Update Rollups
  • Installed Security/non-Security Updates
  • Installed Service Packs and Updates Rollups.
Open ports View the number of:
  • Open TCP ports
  • Open UDP ports
  • Backdoors.
Software View the number of:
  • Antiphishing engines
  • Antispyware engines
  • Antivirus engines
  • Backup applications
  • Data loss prevention applications
  • Device access and desk encryption applications
  • Firewalls
  • Installed applications
  • Instant messengers
  • Peer to peer applications
  • Unauthorized applications
  • Virtual machines
  • VPN clients
  • Web browsers.
Hardware View information on:
  • Number of disk drives
  • Free disk space
  • Memory size
  • Number of processors
  • Other hardware.
System information View information on:
  • The number of shared folders
  • Number of groups
  • Number of users
  • Logged users
  • Audit policy status.
Attributes Adds an Attributes column and groups your scan targets by the assigned attribute.

Note: To launch the Overview tab and display more details on a specific computer, double-click a computer from the list.

Note: Drag and drop a column header in the designated area to group data by criteria.

Back to top


 

History Tab

Select this view to group audit results by date for a specific computer. View Settings top right link can be used to configure the history starting date or history period click the link provided. 

mceclip8.png

The History tab is actually running the Network Security History reports on the selected devices. This report can also be run manually from the reports section of the product as well.

Back to top


 

Vulnerabilities Tab

This tab shares a list of flagged vulnerabilities based on CVE, OVAL, and various other scripted checks built into the GFI LanGuard. When a vulnerability is selected from the Vulnerability List, the Details section provides more information on the selected vulnerability. From the Details section click Affected computers or Unaffected computers to display a list of affected and unaffected computers.

mceclip9.png

These vulnerabilities do not recommend a resolution and only function as alerts. In some cases, installing a patch will resolve the issue, and in others, registry edits are needed. 

The tab also allows users to take certain Dashboard Actions on items.

Back to top


 

Patches Tab

The Patches tab is very similar to the Vulnerabilities tab except that it reports for applications and Microsoft updates the details on the missing/installed patches and service packs found during a network audit.

When a patch/service pack is selected from the list, the Details section provides more information on the selected patch/service pack. From the Details section, click Missing on to display a list of computers having the selected patch missing.

This tab also allows users to take certain Dashboard Actions on items, as seen on the screenshot below.

mceclip10.png

Back to top


 

Ports Tab

This tab shows the results of the completed Port Scans - the details on the open ports found during a network audit. When a port is selected from the Port List, the Details section provides more information on the selected port. From the Details section, click View computers having this port open to display a list of computers having the selected port open.

mceclip11.png

Back to top


 

Software Tab

This tab lists all the software installed on the selected devices found during a network audit. When an application is selected from the Application List, the Details section provides more information on the selected application.

mceclip12.png

The Actions section allows users to add applications to a particular category or Configure rules for particular software categories and applications. For more information refer to Configure software categories.

Note: Agent-less scans require to temporarily run a service on the remote machine. Select Enable full security applications audit… to enable this service on all agent-less scanning profiles.

Back to top


 

Hardware Tab

This tab lists information on the hardware found during a network audit. Select hardware from the list to display more details.

mceclip13.png

Back to top


 

System Information Tab

This tab lists additional general information associated with the operating system about the selected device or group.

mceclip14.png

Back to top


 

Related Articles

Choose files or drag and drop files
Was this article helpful?
Yes
No
  1. Priyanka Bhotika

  2. Posted
  3. Updated

Comments