View device security and events from your Workspace ONE UEM environment with the Security Risk dashboard.

Navigation

Find the dashboard in the Workspace ONE Intelligence console at Dashboards > Security Risk.

Time Filter Selected and Percentages

Select a time period for the data displayed. The time selected affects the percentages displayed beside the risk modules. For example, selecting 14 days sets the percentage to reflect a comparison between now and 14 days ago. A negative percentage indicates that a risk has decreased, and a positive percentage indicates that a risk has increased.

Number, Percentage, and Caret

Modules represent risk using a number, a percentage, and a caret (or arrow).

  • Number - The number value corresponds to a risk over the selected time. The number 10 indicates that 10 risks were reported.
  • Percentage - The percentage compares the risk now to the risk earlier, depending on the time selected. It is a positive or negative number that coincides with the caret. For example, if you select to filter data by 14 days, and get a percentage of -64% with a downward pointing caret, your deployment decreased risks by 64% over the last 14 days.
  • Caret - The caret represents a comparison of the risk now to a time earlier, depending on the selected time. It can point up or down depending on the status and it coincides with the percentage. For example, if you select to view data for the last 30 days and the caret points up and has a positive percentage, your deployment increased risks over the last 30 days.

Security Risk Modules

Risks represented in the Security Risk dashboard are grouped as Threats, Policy Risks, and Vulnerabilities.
Table 1. Security Risk Modules
Groups Modules
Threats

The Threats tab displays events identified by your Workspace ONE UEM compliance engine as compromised.

It also displays and aggregates events reported by your Trust Network services in the Threats Summary module.

Policy Risks

The Policy Risks tab displays events identified by your Workspace ONE UEMcompliance engine that do not comply with configured policies. Events include devices with no passcode and devices that are not encrypted.

Vulnerabilities

The Vulnerabilities tab combines and displays information from third-party security reporting services that report security data and Workspace ONE UEMthat manages your Windows 10 devices.

It displays vulnerabilities reported by the National Institute of Standards and Technology (NIST).

It also ties those applicable CVEs to impacted Windows Desktop devices managed by Workspace ONE UEM.

Navigate through the CVE explanation cards to find out what devices are impacted, the event's CVSS score, NIST articles, and Microsoft advisories.