Access queries and dashboards
Use queries and dashboards to monitor activity and help you determine which action to take on detections. You can use the predefined queries and dashboards, and create additional ones to meet your needs. For information about queries and dashboards, see the ePolicy Orchestrator product documentation.
These predefined queries are available:
VSE: Compliance Over the Last 30 Days VSE: Computers with Threats Detected per Week VSE: Current DAT Adoption VSE: DAT Adoption Over the Last 24 Hours VSE: DAT Deployment VSE: Detection Response Summary VSE: Number of Detections by Tag VSE: Spyware Detected in the Last 24 Hours VSE: Spyware Detected in the Last 7 Days VSE: Summary of Threats Detected in the Last 24 Hours VSE: Summary of Threats Detected in the Last 7 Days VSE: Threat Count by Severity VSE: Threat Names Detected per Week VSE: Threats Detected in the Last 24 Hours VSE: Threats Detected in the Last 7 Days |
VSE: Threats Detected Over the Previous 2 Quarters VSE: Threats Detected per Week VSE: Top 10 Access Protection Rules Broken VSE: Top 10 Buffer Overflows Detected VSE: Top 10 Computers with the Most Detections VSE: Top 10 Detected Threats VSE: Top 10 Threat Sources VSE: Top 10 Threats per Threat Category VSE: Top 10 Users with the Most Detections VSE: Unwanted Programs Detected in the Last 24 Hours VSE: Unwanted Programs Detected in the Last 7 Days VSE: Version 8.5 Compliance VSE: Version 8.7 Compliance VSE: Version 8.8 Compliance |