The Red Canary homepage provides quick access to key information about your security posture in a centralized, easy to access place. You can quickly see any threats that may exist within your environment, detailed information about the endpoints, and the exact telemetry we are analyzing across a filterable timeline – all in one place.
|1||The navigation menu where you can select various options to perform tasks.|
The title bar, which includes Coordinated Universal Time (UTC). UTC is a time standard used to keep time synchronized across the world and is the standard by which all time zones are based. UTC is not a time zone.
An icon that opens your particular Endpoint Detection and Response (EDR) application. The image will reflect your specific application.
A Status checks icon, where you can review the number of configuration checks that passed versus the total.
A toggle for dark/light mode for ease-of-use/viewing.
The user profile, where you can edit your user settings.
A list of unresolved threats with the most severe at the top. You can click a threat to get more detail, and access the threats page directly from this widget.
Red Canary by the numbers provides an executive summary of Red Canary's actions in order to provide a comprehensive picture of your environment as well as a review of key activities performed in the previous 90 days, such as the number of leads investigated and threats discovered.
The number of unique endpoints monitored during the specified timeframe. The number will increment as endpoints with new sensor ID's are detected reporting to the native EDR platform.
The activity feed provides a list of processes that have recently run in Red Canary, such as a playbook triggering or a user marking a threat as Remediated, along with relevant cybersecurity news.
You can tailor your activity feed to display the information that is most important to you and your organization.
The available filters include the following options:
The volume and number of alerts Red Canary has received from your integrated security products and analyzed during a specified timeframe. This also shows if there are any alert sources that require configuration in Red Canary.
For more information about using the Red Canary platform, check out our how-to videos in the Red Canary Help Center.
Please sign in to leave a comment.