May 2020

May 20, 2020

New-look HUD Dashboard

The HUD dashboard has been re-designed to be more intuitive and informative. The HUD dashboard now contains 18 widgets that display traffic and security metrics for the last 7 days (hard-set). The widgets are categorized as follows:

  • Alerts - percentage status of alerts by how they are addressed and the number of alerts generated for each of the 6 types of alerts.

  • Network traffic - widgets for the total number of connections, number of connections with bad reputation entities, total inbound and outbound connections with the Internet, number of blocked connections, number of unauthorized connections, and the number of cross-environment connections.

  • Availability and health - percentage status of the reachability with assets, percentage status of the severity of vulnerabilities on assets, and percentage status of the status of policies on assets.

  • Observed traffic - percentage volume of internal and perimeter traffic, and total number of network sessions and the data throughput.

  • Traffic map - geo-location widget with location markers for locations which were part of inbound or outbound connections with the assets in the Xshield-protected network. 

Download policies of Workload groups

Download assigned and recommended policies for Observed and Enforced Workload groups, from the Workload group's fly panel. Policies are downloaded as a CSV file with the following details - names of source and destination groups and the role of the assets in the groups, and the direction of traffic, service, port, protocol, number of connections, and the data throughput for connections related to the policies.

Access parameters for SAP applications

The Access Parameters page lists 89 default Access parameters used for SAP applications. This reduces your overhead to create them manually.

Access parameters as policy recommendations for Workload groups

System-generated and custom Access parameters are displayed as policy recommendations for Workload groups, if Workload groups use the exact combination of ports and protocols specified in the Access parameters.

May 6, 2020

Executive Summary report

Download the Executive Security report that contains the summary of the findings from the latest Nessus scan results. This report is available only if you have integrated a Nessus Scanner with Xshield and Xshield has fetched the scan results at least once.

The findings in the report can help you be more resilient to cyber threats. The report contains the following:

  • Asset analysis - percentage of assets by the roles they play in apps, number of managed and discovered assets, and the number of OS and non-OS vulnerabilities on assets.
  • Traffic analysis - the number of assets that are either externally or internally exposed to threats on open ports and the percentage of external and internal traffic by the services they use.

This report should be generated on-demand and can be downloaded as a PDF, from the Reports page.

Filter Access parameters by port or protocol

The Policy Center > Access parameters page lists an additional column Port/Protocol. This column displays the port and the protocol used for the Access parameter.

You can filter the Access parameters page by the port or protocol used.

Filter Access policies by names of Accessor or Protected entities

The Policy Center > Access policies page can be filtered by the names of Accessor or Protected entities used in the Access policies.

Policy recommendations for role-based traffic in and between Workload groups

Policy recommendations for a Workload group include recommendations for inbound and outbound traffic, by the roles and services used by the assets in the Workload group. These recommendations are available for traffic in a Workload group and traffic between Workload groups.

Policy recommendations for traffic to Domain groups

Policy recommendations for a Workload group include recommendations for outbound traffic to Domain groups.

Did this answer your question? Thanks for the feedback There was a problem submitting your feedback. Please try again later.