Skip to main content

Security Dashboard

Monitor and manage security across your organization with the Security Dashboard.

Overview

The Security Dashboard provides a centralized view of:

  • Security status and alerts
  • User activity patterns
  • Authentication events
  • Compliance status
  • Potential security threats

Accessing the Dashboard

  1. Go to Settings > Security > Dashboard
  2. Or Admin > Security Dashboard

Required Permissions

  • Super Admin: Full access
  • Admin: Organization-level access
  • Manager/User: No access

Dashboard Overview

Security Score

At-a-glance security health:

ScoreStatusDescription
90-100ExcellentAll security measures in place
70-89GoodMinor improvements recommended
50-69FairSeveral issues need attention
Under 50PoorCritical security gaps

Score Factors

Your score is based on:

  • 2FA adoption rate
  • Password policy compliance
  • Session security settings
  • Recent security events
  • Data protection settings

Security Metrics

Authentication Overview

MetricDescription
Successful LoginsToday/This Week/This Month
Failed LoginsPotential unauthorized access
Unique UsersActive users
2FA UsagePercentage using 2FA

User Activity

MetricDescription
Active SessionsCurrent logged-in users
Inactive AccountsNo login in 30+ days
Deactivated UsersRecently deactivated
Pending InvitationsUnaccepted invites

Data Security

MetricDescription
Data ExportsRecent exports
API UsageAPI calls this period
Permission ChangesRole/access modifications
Sensitive OperationsHigh-risk actions

Alerts and Notifications

Alert Types

Alert LevelExamples
CriticalMultiple failed logins, potential breach
WarningUnusual activity, expired sessions
InfoNew user, configuration change

Active Alerts Panel

Shows current alerts:

  1. Critical alerts - Require immediate action
  2. Warning alerts - Should be investigated
  3. Recent notifications - Informational items

Managing Alerts

For each alert:

  1. Click to view details
  2. Investigate as needed
  3. Mark as resolved
  4. Add notes/comments

User Security

2FA Adoption

Monitor two-factor authentication:

ViewInformation
Overall RatePercentage of users with 2FA
By Role2FA adoption by user role
TrendAdoption over time
Non-compliantUsers without 2FA

Enforcing 2FA

  1. Go to Security Settings
  2. Enable Require 2FA
  3. Choose enforcement level:
    • All users
    • Admins only
    • Specific roles
  4. Set grace period

Password Security

MetricRecommendation
Average AgeReset older than 90 days
StrengthEnforce strong passwords
ReusePrevent password reuse

Session Management

Active Sessions

View all active sessions:

  • User name/email
  • Device type
  • Location (IP-based)
  • Session start time
  • Last activity

Session Controls

Actions available:

ActionEffect
End SessionLog out specific session
End All SessionsForce logout for user
Block IPPrevent login from IP

Session Settings

Configure session behavior:

  1. Session Timeout

    • Idle timeout duration
    • Maximum session length
  2. Concurrent Sessions

    • Allow multiple sessions
    • Limit per user
  3. Remember Me

    • Enable/disable
    • Duration

Threat Detection

Suspicious Activity

Automatically detected:

ThreatDescription
Brute ForceMultiple failed logins
Impossible TravelLogins from distant locations
Unusual HoursOff-hours access
Mass ExportLarge data downloads
Role EscalationUnexpected permission changes

Threat Response

When threats detected:

  1. Alert generated
  2. Review threat details
  3. Investigate user
  4. Take action:
    • Warn user
    • Force password reset
    • Lock account
    • Report incident

Geographic Analysis

FeatureDescription
Login MapVisualize login locations
Allowed CountriesRestrict by country
Blocked RegionsDeny access from regions
AlertsUnknown location logins

Access Control

Permission Overview

View organization permissions:

  • Users by role
  • Location assignments
  • Feature access
  • Recent changes

Access Reviews

Periodic reviews:

  1. Set review frequency

    • Monthly
    • Quarterly
    • Annually
  2. Review scope

    • All users
    • Specific roles
    • External access
  3. Review process

    • Certify access
    • Remove unnecessary
    • Document decisions

Orphaned Access

Identify and resolve:

  • Users with no location assignment
  • Inactive users with high privileges
  • Unused service accounts

Compliance Monitoring

Compliance Status

Track regulatory compliance:

AreaStatus
GDPRCompliant/Action Needed
Data RetentionOn Track/Overdue
Access ReviewsComplete/Pending
Security TrainingComplete/Outstanding

Compliance Tasks

View pending tasks:

  1. Data subject requests
  2. Access review certifications
  3. Policy acknowledgments
  4. Training completions

Audit Trail

Quick access to:

  • Recent audit events
  • Export audit logs
  • Generate compliance reports

Reports

Security Reports

Available reports:

ReportContent
Security SummaryOverall security status
Login ReportAuthentication events
Access ReportUser access details
Compliance ReportRegulatory compliance
Incident ReportSecurity incidents

Generating Reports

  1. Click Generate Report
  2. Select report type
  3. Choose date range
  4. Configure options
  5. Export (PDF/CSV)

Scheduled Reports

Automate report delivery:

  1. Create report template
  2. Set schedule
  3. Choose recipients
  4. Enable delivery

Configuration

Dashboard Settings

Customize your view:

  1. Default View

    • Overview
    • Detailed metrics
    • Alerts focus
  2. Widget Layout

    • Arrange widgets
    • Show/hide sections
  3. Refresh Rate

    • Real-time
    • Every minute
    • Manual only

Alert Settings

Configure alerts:

  1. Thresholds

    • Failed login limit
    • Export limits
    • Unusual activity sensitivity
  2. Notifications

    • Email alerts
    • In-app notifications
    • Webhook notifications
  3. Recipients

    • Security admins
    • Organization admins
    • Custom list

Best Practices

Daily Monitoring

  • Review critical alerts
  • Check failed logins
  • Monitor active sessions
  • Note unusual patterns

Weekly Tasks

  • Review security score
  • Address warnings
  • Check 2FA adoption
  • Review pending tasks

Monthly Tasks

  • Generate security report
  • Review access permissions
  • Update security settings
  • Conduct access review

Security Response

When issues arise:

  1. Assess severity

    • Critical: Act immediately
    • Warning: Investigate within 24h
    • Info: Review when convenient
  2. Investigate

    • Review audit logs
    • Check user activity
    • Identify scope
  3. Respond

    • Take appropriate action
    • Document response
    • Update procedures
  4. Follow up

    • Verify resolution
    • Prevent recurrence
    • Update training

Troubleshooting

Dashboard Not Loading

  1. Refresh browser
  2. Check permissions
  3. Try different browser
  4. Contact support

Missing Data

  1. Verify date range
  2. Check filters
  3. Confirm data exists
  4. Allow time for processing

Alert Issues

  1. Check notification settings
  2. Verify email/notification delivery
  3. Review alert thresholds
  4. Test alert system