Knowledge Base » Analytics » Understanding Analytics and Reporting

Understanding Analytics and Reporting

Analytics and Reporting

Analytics Overview

GuardAxion provides comprehensive analytics to monitor security events, user behavior, and system performance.

Analytics Dashboards

Main Dashboard

Displays overview metrics:

  • Total enrolled browsers
  • Security events (24h)
  • Top threats blocked
  • Active users
  • Policy violations

Advanced Analytics

Location: Analytics & Monitoring > Advanced Analytics

Features:

  • Real-time event stream
  • Security trends over time
  • DLP violation analysis
  • User behavior patterns
  • Geographical distribution

Predictive Analytics

Location: Analytics & Monitoring > Predictive Analytics

AI-powered insights:

  • Threat forecasting
  • Anomaly detection
  • Risk scoring
  • Pattern recognition
  • Trend predictions

Event Types

Security Events

  1. Block: Firewall blocked domain access
  2. DLP Violation: Data loss prevention trigger
  3. DLP Bypass: Excluded URL accessed
  4. Threat Detected: Malicious content identified
  5. Login Anomaly: Unusual login pattern

System Events

  1. Enrollment: New browser registered
  2. Policy Sync: Rules updated
  3. Configuration Change: Settings modified
  4. User Action: Administrative activity

Filtering and Searching

Filter Options

  • Time Range: Last hour to 90 days
  • Event Type: Specific event categories
  • Severity: Critical, High, Medium, Low
  • Service Class: Policy group
  • User/Browser: Individual tracking
  • Domain: Specific website

Search Capabilities

  • Full-text search across events
  • Regular expression support
  • Combined filters
  • Saved search queries

Custom Reports

Creating Reports

  1. Navigate to desired analytics view
  2. Apply filters for data needed
  3. Click Export or Generate Report
  4. Select format (CSV, PDF, JSON)
  5. Download or schedule delivery

Scheduled Reports

  1. Configure report parameters
  2. Set schedule (daily, weekly, monthly)
  3. Add email recipients
  4. Save scheduled report

Report Types

  • Executive Summary: High-level metrics
  • Security Incidents: Detailed event log
  • Compliance: Audit trail for regulations
  • User Activity: Individual behavior
  • Trend Analysis: Historical patterns

Key Metrics to Monitor

Security Metrics

  • Threats blocked per day
  • DLP violations by severity
  • Top blocked domains
  • Failed login attempts
  • Policy bypass attempts

User Metrics

  • Active users count
  • Login patterns
  • Most visited sites
  • Policy violation rate
  • Browser enrollment status

System Metrics

  • Policy sync success rate
  • API response times
  • Error rates
  • Browser version distribution

Anomaly Detection

Automated Alerts

System automatically detects:

  • Unusual login times
  • Geographic anomalies
  • Spike in violations
  • New threat patterns
  • Policy circumvention attempts

Configuring Alerts

  1. System Settings > Alerts
  2. Set thresholds for:
    • Event volume
    • Severity levels
    • User behavior
    • System health
  3. Configure notification methods

Using Analytics for Security

Threat Hunting

  1. Review anomaly detections
  2. Investigate unusual patterns
  3. Correlate multiple events
  4. Identify compromised accounts
  5. Block emerging threats

Compliance Reporting

  • GDPR data access logs
  • SOC 2 audit trails
  • HIPAA activity monitoring
  • PCI-DSS web filtering

Performance Optimization

  • Identify policy bottlenecks
  • Optimize rule priorities
  • Reduce false positives
  • Improve response times

Best Practices

  • Review analytics daily
  • Set up automated alerts
  • Export logs for long-term storage
  • Correlate with other security tools
  • Use predictive analytics proactively
  • Document incident responses
  • Regular reporting to stakeholders
  • Tune policies based on data

Troubleshooting

Missing Data

  • Check time range selection
  • Verify filters applied
  • Ensure browsers are syncing
  • Check service class assignment

Slow Performance

  • Reduce time range
  • Limit concurrent filters
  • Export data for offline analysis
  • Contact support for optimization