Download page Monitor the Home Page of Cisco Secure Application.
Monitor the Home Page of Cisco Secure Application
The Home page is the landing page for Cisco Secure Application. This page provides a quick view of the security of the selected application.
By default, this page displays an overview of the selected application. For information about selecting a specific application or service, see Select Application Scope at Monitor Application Security Using Cisco Secure Application.
The Business Transactions pane includes details to monitor the vulnerability risk of a Business Transaction.
The name of the business transaction. To view the business transaction on the AppDynamics Controller, click the icon next to the name.
Business Transactions By Risk
|The risk score. The higher the value, the higher the risk for the application vulnerability. Business risk is calculated based on the likelihood of vulnerability exploitation, and the impact of the potential exploitation in a business transaction. These are the three statuses: Normal 0-330, Warning 340-660, and Critical 670-1000.|
|Daily Highest Business Risk Score Detected||The highest business risk score detected by Business Risk Score, Warning Threshold, and Critical Threshold.|
|Top Recommended Actions||The top remediations that will reduce the most business risk across all of your business transactions.|
The Vulnerabilities pane includes a real-time trend graph that shows the number of both fixed and open vulnerabilities.
Vulnerabilities By Severity
This chart displays visualization for the number of vulnerabilities based on these severity levels: Critical, High, Medium, and Low.
|This chart displays the number of open tickets versus the number of fixed tickets. This shows the trend of fixing the open vulnerabilities.|
Days Since First Detected
|This chart displays the number of days the vulnerability is open versus the severity of the vulnerability (critical, high, medium, or low).|
The Attacks pane includes the visualization for the number of attacks.
Attacks By Outcome
This chart represents the total number of attacks. This chart displays the number of attacks based on these states: Exploited, Blocked, and Attempted.
This chart displays the top 10 applications based on attacks per application. For more information about changing the scope of the application, see Monitor Application Security Using Cisco Secure Application. These applications are in either an Exploited, Blocked, or Attempted state. You can hover over each state to view the total number.
Top Attack Types
This chart displays the top attack types. Attack Types include:
The Applications pane includes the number of nodes of the managed applications.
|ACTIVE||The number highlights the number of nodes that are actively communicating with the AppDynamics Controller.|
|SUPPORTED||The number highlights the number of nodes registered with the Cisco Secure Application. This also displays the number of unregistered nodes.|
|READY||The number highlights the number of nodes that can be successfully registered.|
|ENABLED||The number highlights the total number of nodes that have security enabled for the applications. This also displays the number of nodes on which the security setting is disabled.|
|SECURED||The number highlights the number of secured nodes. This also displays the number of unsecured nodes.|
|TREND||This displays the number of supported, enabled, secured, active, and ready nodes against the day of the month.|
You can click the Export button to download the table data. It downloads all of the rows, columns, and related data in a
.csv file. A separate
.json file includes the following: link to the Cisco Secure Application website where the table is exported from, global filters (if any) applied to the pages, and search filters applied to the columns. These two files are compressed into a
.zip file for downloading. The maximum number of rows that can be exported is 10,000. If table data exceeds 10,000 rows you may apply filters to narrow your search, or export the first 10,000 results.