YOU’RE NOT VIEWING PANDA SECURITY USA. CLICK TO IMPROVE YOUR EXPERIENCE
VISIT PANDA SECURITY USA
x
48h OFFER
If you're already a customer of
our homeusers protection,
renew now with 50% off
RENEW NOW
x
48-HOUR OFFER
50%
RENEWALS
Home users only
RENEW AT A DISCOUNT
x
SPECIAL OFFER
If you're already a customer of
our homeusers protection,
renew now with 50% off
RENEW NOW
x
HALLOWEEN OFFER
take advantage of our
terrific discounts
BUY NOW AND GET 50% OFF
x
SPECIAL OFFER
Buy the best antivirus
at the best price
BUY NOW AND GET 50% OFF
x
SPECIAL OFFER
Buy the best antivirus
at the best price
BUY NOW AND GET 50% OFF
x
UP TO
-60%
BUY NOW
x
UP TO
-60%
BUY NOW

Technical Support

Need help?

 

How can I view the Panda Data Control data with Advanced Visualization Tool?

Information applies to:

Products
Panda Data Control

Advanced Visualization Tool generates the widgets, dashboards and graphical applications that display the collected data in an ordered and easy-to-understand way.

The Web server also hosts the management console, accessible from any place at any time through any ordinary compatible browser.

Advanced Visualization Tool implements functions through the tools and resources described below:
  • A wide range of widgets that enable visualization of the actions taken on the PII files.
  • Dashboards that can be configured by the administrator with information for the IT department.
  • Configurable alerts that are generated in real time to reveal potentially dangerous situations.
  • Graphical resources to view and work with the PII knowledge tablewith details of the actions taken on files with personal data.
  • Advanced tools for searching and processing the information stored: filters, groupings, advanced operations with data, generation of new widgets with information, etc.
Applications / Dashboards
The most relevant information for the IT team is displayed through three applications accessible from the Web management console:
  • Files and machineswith PII: I dentifies PII files on the network, showing the computers they are on and the actions taken on them.



  • User operations on PII files: Shows the operations that users take on the PII files, detailing the physical device they are on (hard disk, USB drive, etc.)

  • Risk of PII extraction: Displays actions that could represent a leak of personal data.

For more information, please visit de Data Control guide
Help nº- 20180806 700043 EN

Have you resolved your query with this article?

yes no

Thanks for your answer


Why didn't you find it helpful?


The instructions are too complex.
The instructions are too long.
The instructions don't work.
I'd rather have a video.
Other reasons.




Talk to a technician!

 

Business hours: Mondays-Fridays 9:00 to 18:00 CET

Outside business hours, please use the online form.





ALWAYS ONLINE TO HELP YOU TWITTER FORUM RATE US CHAT
ALWAYS ONLINE TO HELP YOU TWITTER FORUM RATE US CHAT