Security Dashboard
Monitor and manage security across your organization with the Security Dashboard.
Overview
The Security Dashboard provides a centralized view of:
- Security status and alerts
- User activity patterns
- Authentication events
- Compliance status
- Potential security threats
Accessing the Dashboard
- Go to Settings > Security > Dashboard
- Or Admin > Security Dashboard
Required Permissions
- Super Admin: Full access
- Admin: Organization-level access
- Manager/User: No access
Dashboard Overview
Security Score
At-a-glance security health:
| Score | Status | Description |
|---|---|---|
| 90-100 | Excellent | All security measures in place |
| 70-89 | Good | Minor improvements recommended |
| 50-69 | Fair | Several issues need attention |
| Under 50 | Poor | Critical security gaps |
Score Factors
Your score is based on:
- 2FA adoption rate
- Password policy compliance
- Session security settings
- Recent security events
- Data protection settings
Security Metrics
Authentication Overview
| Metric | Description |
|---|---|
| Successful Logins | Today/This Week/This Month |
| Failed Logins | Potential unauthorized access |
| Unique Users | Active users |
| 2FA Usage | Percentage using 2FA |
User Activity
| Metric | Description |
|---|---|
| Active Sessions | Current logged-in users |
| Inactive Accounts | No login in 30+ days |
| Deactivated Users | Recently deactivated |
| Pending Invitations | Unaccepted invites |
Data Security
| Metric | Description |
|---|---|
| Data Exports | Recent exports |
| API Usage | API calls this period |
| Permission Changes | Role/access modifications |
| Sensitive Operations | High-risk actions |
Alerts and Notifications
Alert Types
| Alert Level | Examples |
|---|---|
| Critical | Multiple failed logins, potential breach |
| Warning | Unusual activity, expired sessions |
| Info | New user, configuration change |
Active Alerts Panel
Shows current alerts:
- Critical alerts - Require immediate action
- Warning alerts - Should be investigated
- Recent notifications - Informational items
Managing Alerts
For each alert:
- Click to view details
- Investigate as needed
- Mark as resolved
- Add notes/comments
User Security
2FA Adoption
Monitor two-factor authentication:
| View | Information |
|---|---|
| Overall Rate | Percentage of users with 2FA |
| By Role | 2FA adoption by user role |
| Trend | Adoption over time |
| Non-compliant | Users without 2FA |
Enforcing 2FA
- Go to Security Settings
- Enable Require 2FA
- Choose enforcement level:
- All users
- Admins only
- Specific roles
- Set grace period
Password Security
| Metric | Recommendation |
|---|---|
| Average Age | Reset older than 90 days |
| Strength | Enforce strong passwords |
| Reuse | Prevent password reuse |
Session Management
Active Sessions
View all active sessions:
- User name/email
- Device type
- Location (IP-based)
- Session start time
- Last activity
Session Controls
Actions available:
| Action | Effect |
|---|---|
| End Session | Log out specific session |
| End All Sessions | Force logout for user |
| Block IP | Prevent login from IP |
Session Settings
Configure session behavior:
-
Session Timeout
- Idle timeout duration
- Maximum session length
-
Concurrent Sessions
- Allow multiple sessions
- Limit per user
-
Remember Me
- Enable/disable
- Duration
Threat Detection
Suspicious Activity
Automatically detected:
| Threat | Description |
|---|---|
| Brute Force | Multiple failed logins |
| Impossible Travel | Logins from distant locations |
| Unusual Hours | Off-hours access |
| Mass Export | Large data downloads |
| Role Escalation | Unexpected permission changes |
Threat Response
When threats detected:
- Alert generated
- Review threat details
- Investigate user
- Take action:
- Warn user
- Force password reset
- Lock account
- Report incident
Geographic Analysis
| Feature | Description |
|---|---|
| Login Map | Visualize login locations |
| Allowed Countries | Restrict by country |
| Blocked Regions | Deny access from regions |
| Alerts | Unknown location logins |
Access Control
Permission Overview
View organization permissions:
- Users by role
- Location assignments
- Feature access
- Recent changes
Access Reviews
Periodic reviews:
-
Set review frequency
- Monthly
- Quarterly
- Annually
-
Review scope
- All users
- Specific roles
- External access
-
Review process
- Certify access
- Remove unnecessary
- Document decisions
Orphaned Access
Identify and resolve:
- Users with no location assignment
- Inactive users with high privileges
- Unused service accounts
Compliance Monitoring
Compliance Status
Track regulatory compliance:
| Area | Status |
|---|---|
| GDPR | Compliant/Action Needed |
| Data Retention | On Track/Overdue |
| Access Reviews | Complete/Pending |
| Security Training | Complete/Outstanding |
Compliance Tasks
View pending tasks:
- Data subject requests
- Access review certifications
- Policy acknowledgments
- Training completions
Audit Trail
Quick access to:
- Recent audit events
- Export audit logs
- Generate compliance reports
Reports
Security Reports
Available reports:
| Report | Content |
|---|---|
| Security Summary | Overall security status |
| Login Report | Authentication events |
| Access Report | User access details |
| Compliance Report | Regulatory compliance |
| Incident Report | Security incidents |
Generating Reports
- Click Generate Report
- Select report type
- Choose date range
- Configure options
- Export (PDF/CSV)
Scheduled Reports
Automate report delivery:
- Create report template
- Set schedule
- Choose recipients
- Enable delivery
Configuration
Dashboard Settings
Customize your view:
-
Default View
- Overview
- Detailed metrics
- Alerts focus
-
Widget Layout
- Arrange widgets
- Show/hide sections
-
Refresh Rate
- Real-time
- Every minute
- Manual only
Alert Settings
Configure alerts:
-
Thresholds
- Failed login limit
- Export limits
- Unusual activity sensitivity
-
Notifications
- Email alerts
- In-app notifications
- Webhook notifications
-
Recipients
- Security admins
- Organization admins
- Custom list
Best Practices
Daily Monitoring
- Review critical alerts
- Check failed logins
- Monitor active sessions
- Note unusual patterns
Weekly Tasks
- Review security score
- Address warnings
- Check 2FA adoption
- Review pending tasks
Monthly Tasks
- Generate security report
- Review access permissions
- Update security settings
- Conduct access review
Security Response
When issues arise:
-
Assess severity
- Critical: Act immediately
- Warning: Investigate within 24h
- Info: Review when convenient
-
Investigate
- Review audit logs
- Check user activity
- Identify scope
-
Respond
- Take appropriate action
- Document response
- Update procedures
-
Follow up
- Verify resolution
- Prevent recurrence
- Update training
Troubleshooting
Dashboard Not Loading
- Refresh browser
- Check permissions
- Try different browser
- Contact support
Missing Data
- Verify date range
- Check filters
- Confirm data exists
- Allow time for processing
Alert Issues
- Check notification settings
- Verify email/notification delivery
- Review alert thresholds
- Test alert system
Related Topics
- Audit Logs - Detailed activity logs
- GDPR Compliance - Data protection
- Permission Matrix - Access levels
- User Management - Managing users