Open built-in dashboards, add views, and drag in and arrange reports critical for operational monitoring, troubleshooting, and forensics tasks.
Note: Dashboards for WhatsUp Gold Add Ons (NTA, Configuration Management, Virtual, Application Monitoring, and Wireless) can be accessed from the Analyze menu > WhatsUp Gold Add Ons.
Before you choose a built-in dashboard to begin from:
From the analyze menu (ANALYZE menu > Dashboards) on the main toolbar:
Open and search the Add Reports () palette and 'drag in' any of the reports into the current or an existing view.
Note: Selecting Full Screen from the dashboard options menu causes the custom dashboard view to be displayed across the entire browser without WhatsUp Gold navigation. Dashboard views rendered in full screen mode have dedicated URLs so they may be bookmarked for easy access in the future. These features can be especially useful when one or more dashboard views are intended for display within a Network Operation Center. Please see Revolving Wallboard with WhatsUp Gold for an example use case. Click X to exit the full screen view.
WhatsUp Gold provides expert features and functionality that enable you share with internal and external stakeholders periodically, on-demand, or whenever you feel this collaboration is appropriate:
Note: For scheduled reports, it is best practice to create an additional WhatsUp Gold user to ensure that the scheduled export and email of report data maintains consistent settings, graphing modes, and format. WhatsUp Gold Report Settings (settings for graphing, top n, and thresholding, for example) persist based on the report instance, the current device selected, and the WhatsUp Gold login you use.
You can customize views that help your team anticipate, track, and react quickly to critical incidents.
For example, you can create a dashboards that:
Create view(s) to include wireless reports (access points, rogues, and clients) and custom overlay on a map of your office, building, or campus.
Create view(s) to display traffic and connection attempts (such as Network Traffic Analysis) as well as active monitors that track login attempts or intrusion attempts on devices that are likely to be compromised. Failed Connections and Discarded packets can be indicators of Denial of Service attacks often used as a diversion to mask intrusion and penetration attacks. Received/transmit packet volume asymmetry in the transmit direction following a suspected intrusion attempt can indicate a breach of data is in process.
Leverage builtin inventory dashboards (ANALYZE menu > Inventory) to track and report on network and application infrastructure and devices.