Category filter

The XDR Dashboard: The Central Hub for Global Threat Visibility

Modern cybersecurity operations demand complete visibility into every endpoint within an organization. As threats continue to evolve beyond the scope of traditional antivirus and endpoint detection tools, security teams require a unified system that can continuously analyze endpoint activity, detect anomalies, and initiate an appropriate response. An Extended Detection and Response (XDR) solution serves precisely this purpose, offering centralized visibility and intelligent correlation across all monitored endpoints.

Glossary of Key Terms

Term Definition
Endpoint A device on which the XDR agent is deployed, allowing it to collect telemetry data, monitor system behavior, and report potential security events back to the console.
Threat Any activity, process, or entity with the potential to harm an endpoint or compromise data (e.g., malware, unauthorized actions, vulnerability exploitation). It corresponds to a detected pattern of suspicious behavior indicating a potential breach.
Anomaly Any endpoint activity that deviates from usual patterns. It serves as an early indicator for investigation, even if it does not immediately indicate a confirmed threat.
Adversary Any individual, group, or automated entity attempting to compromise endpoints, data, or networks.
Panel An individual dashboard section displaying specific data or metrics derived from endpoint telemetry and threat analysis to help administrators interpret activity.
Severity The assessed impact or potential risk of a threat or incident, indicating how harmful it could be if unaddressed, aiding in response prioritization.
XDR Agent Software installed on an endpoint enabling communication with the Hexnode XDR console. It continuously monitors system activity, processes, network connections, and file events.
Environment The complete collection of an organization’s endpoints, users, networks, configurations, and security posture where the XDR agent is deployed and threats are managed.
Administrators Technicians using the Hexnode XDR console to review detections, investigate incidents, assess impact, and coordinate remediation actions.

First Steps: Get Started with Hexnode XDR

The very first steps administrators must complete are part of the initial onboarding through the Hexnode XDR Get Started process, designed to align the console with operational needs.

The Get Started section presents two choices:

  • Quick Overview: Explore documentation, watch learning modules, or interact with Hexnode Genie for on-demand explanations.
  • Start Onboarding: Guides administrators through integrating XDR, deploying it via a chosen management system, or performing manual installation (command-line or package deployment).

Once completed and the agent begins communicating, administrators gain access to the Hexnode XDR Dashboard, the central hub for all active detections and endpoint telemetry.

Overview of the XDR Dashboard

The XDR Dashboard presents an organized overview of all security-related activities across deployed endpoints. It helps administrators assess threat posture, identify incidents, and prioritize responses.

  • Real-time Insights: Every metric and visualization reflects real-time telemetry.
  • Time Filtering: Data can be filtered by specific date ranges up to a maximum of 90 days.
  • Trend Comparison: All time-based panels automatically compare current metrics with the previous equivalent time range (e.g., this week vs. last week).

Dashboard Components

The dashboard translates complex telemetry into actionable intelligence through the following analytical panels:

  1. Incident Landscape
  2. Threats
  3. Critical Events
  4. Activity Feed
  5. Threat Activity
  6. Recent Incidents
  7. MITRE ATT&CK & Events
  8. Endpoint Remediation
  9. Incident Allocation

XDR Dashboard Panels Breakdown

1. Incident Landscape

Provides a summarized view of key threat metrics to help administrators understand the organization’s current threat exposure.

Metric Description
Total Incidents Cumulative number of identified incidents (Threats + Alerts). Threats are harmful activities; Alerts are notifications triggered by predefined Alert Profiles.
Open Incidents Count of incidents (threats or alerts) remaining unassigned to any technician, indicating pending workload.
Threats Total number of threats detected across all monitored endpoints in the selected period.
Alerts Total number of alerts generated based on configured Alert Profiles.
Vulnerable Devices Number of endpoints affected by threats within the chosen time range.

2. Threats

A visual pie chart showing the distribution of threats across different severity levels as a percentage.

Severity Level Color Representation
Low Blue
Medium Green
High Yellow

3. Critical Events Panel

Lists the most severe threats and alerts chronologically. Allows administrators to quickly review high-priority detections as they occur.

  • Data Displayed: Incident name, category, and time since identified.
  • Color Coding: Green (Low), Blue (Medium), Yellow (High), Red (Critical).

4. Activity Feed Panel

A continuous, consolidated timeline of operational and administrative actions within the console to maintain awareness and support traceability.

  • Activities Tracked: Technician updates, policy changes, remediation actions, incident assignments, and audit events.
  • Data Displayed: Endpoint involved, user performing the action, activity type, and time elapsed.

5. Threat Activity

A line graph presenting a time-based view of how threats appear across endpoints to help spot spikes, patterns, and changing volumes.

  • Y-axis: Count (number of threats) detected.
  • X-axis: Time aligned with the selected range (days, weeks, or months).

6. Recent Incidents

A table view listing the 10 most recent incidents in chronological order (newest first). Clicking an incident redirects to its detailed view.

Column Description
Incident Name Identifies the incident based on threat or alert type.
Host Name Specifies the affected endpoint for quick identification.
Severity Indicates the risk level to help prioritize entries.
Timestamp The exact time the incident was detected by the XDR agent.

7. MITRE ATT&CK & Events

Maps threat activity against the globally recognized MITRE ATT&CK framework to help administrators understand attacker intent, methods, and potential impact. Displayed as a bar graph (Y-axis: number of events/threats; X-axis: 14 MITRE tactics).

MITRE ATT&CK Tactics Mapped:

Tactic Description
Initial Access Attempts to gain entry via phishing, vulnerable services, or malicious files.
Execution Running malicious code, scripts, or commands on the endpoint.
Persistence Maintaining long-term access, surviving reboots or credential changes.
Reconnaissance Collecting information about endpoints, users, or the environment prior to an attack.
Resource Development Preparing tools, infrastructure, or malicious files for later use.
Privilege Escalation Attempting to gain higher-level permissions for deeper control.
Defense Evasion Avoiding detection by hiding processes or disabling security tools.
Credential Access Stealing passwords, tokens, or authentication data.
Discovery Searching the system to learn about files, networks, or nearby endpoints.
Lateral Movement Moving from one compromised endpoint to another within the network.
Collection Gathering sensitive data (documents, keystrokes, screenshots).
Command and Control (C2) Establishing communication with an external server for commands or data transfer.
Exfiltration Sending collected data out to an attacker-controlled location.
Impact Directly affecting system integrity via file corruption, encryption, or disruption.

8. Endpoint Remediation

A pie chart overview of the actions taken to respond to threats, showing the percentage of each remediation method used.

Remediation Action Description Color Code
Kill Terminates a malicious or suspicious process to prevent further harm. Green
Isolate Places the endpoint in a restricted sandbox network, preventing communication with other endpoints. Blue
Quarantine Moves a suspicious file to a secure, isolated location so it cannot be executed. Yellow
Delete Permanently removes a malicious or high-risk file to eliminate the threat. Red

9. Incident Allocation

A pie chart showing how incidents are distributed between technicians to manage workload and identify pending items.

Allocation Status Description Color Code
Assigned Incidents allocated to a technician for tracking and remediation. Green
Unassigned Pending incidents requiring administrative attention for assignment and resolution. Red
Extended Detection & Response