Navigate to the Dashboard

provides a real-time dashboard that displays these pages:

Overview
This page provides an overall overview of attacks and vulnerabilities of monitored applications. See Overview of .
Applications
This page provides the details of monitored nodes that are registered with for the managed applications. See Monitor Security Status of Applications.
Business Transactions
This page includes details to monitor the vulnerability risk of a business transaction. See Monitor Business Transactions.
Libraries
This page provides details of the existing libraries that require remediation. See Monitor Libraries.
Vulnerabilities
This page provides information about all discovered vulnerabilities. See Monitor Vulnerabilities.
Attacks
This page provides information about all detected attacks. See Monitor Attacks.
Observations
This page provides information to investigate incidents and define the runtime policy. See Monitor Observations.
Policies
This page allows you to create or customize the policies for vulnerabilities and attacks. See Policies.