Introduction to Netzilo

high-level-dia

Overview of Dashboard Components

This section will explain the various components displayed in the security monitoring dashboard, as shown in the image. This dashboard is designed to provide a clear and comprehensive overview of your network's security posture, user activity, and device distribution.

1. Security Score

The Security Score component is a dynamic indicator that reflects the overall security posture of the devices within the monitored environment. This score is calculated based on several factors, including device configurations, security settings, software versions, and detected vulnerabilities. The score ranges from A (excellent) to F (poor), with A representing a robust security posture and F indicating significant risks. The visual representation of this score helps administrators quickly assess the security status and prioritize actions to mitigate risks.

2. Users

The Users component displays the total number of users currently being monitored within the network. This value is essential for tracking the scope of monitoring and understanding how many individuals are contributing to the overall security posture. The graph accompanying the user count shows the trend over time, allowing for easy observation of changes in user activity and potential impacts on security.

3. Devices

The Devices component indicates the total number of devices being monitored. This figure includes all devices connected to the network, such as desktops, laptops, mobile devices, and others. The accompanying graph provides a time-based view of how the number of devices has changed, which can be crucial for identifying spikes in device connections that may require further investigation.

4. Devices - OS Distribution

The OS Distribution section provides a detailed breakdown of the operating systems in use across all monitored devices. This bar chart highlights the percentage and absolute number of devices running on different operating systems, such as Windows, OSX, Linux, iOS, and Android. Understanding the OS distribution is critical for tailoring security policies and ensuring that all systems, regardless of platform, are adequately protected.

5. Security Score Distribution

The Security Score Distribution radar chart offers a granular view of the security posture across different categories (A through F). This chart helps visualize the spread of security scores among devices, making it easier to identify which devices fall into lower security categories and require immediate attention. The goal is to maximize the number of devices in the higher categories (A and B) while minimizing those in lower categories (D, E, F).

There is no centralized VPN server with Netzilo - your computers, devices, machines, and servers connect to each other directly over a fast encrypted tunnel. It creates a high-performance point-to-point WireGuard® overlay network that connects machines running anywhere in just a few clicks.

It literally takes less than 5 minutes to deploy a secure point-to-point VPN with Netzilo.

About Netzilo

How Netzilo works

Concepts, architecture, protocols, and more.

Read more

Netzilo vs. traditional VPN

Learn how Netzilo compares to traditional VPNs and why it is better.

Read more

Why WireGuard with Netzilo

Learn why and how Netzilo uses WireGuard.

Read more

How-To Guides

Quickstart guide

Start using Netzilo in under 5 minutes.

Read more

Manage network access

Learn how to use access controls to manage access to your machines.

Read more

Add users to your network

learn how to add team members to your Netzilo network.

Read more

Route traffic to private networks

Learn how to provide access to LANs, VPS, and corporate private networks.

Read more

Configure default routes and traffic for the Internet

Understand how to set up your network for accessing the internet through default routes, also known as "exit nodes".

Read more

Log and monitor network activity

Learn how to keep track of system and network activities in your account.

Read more

Manage DNS in your network

Learn how to configure name servers in your private network.

Read more