AgentX dashboards
Add AgentX dashboards to visualize log data and security metrics from Windows and Linux endpoints.
Prerequisites
AgentX KB installed in Logpoint
Administrator access to Logpoint
Repository configured to store AgentX logs
AgentX collecting logs from at least one endpoint
Procedure
Go to Settings > Knowledge Base and select Dashboards.
Select Vendor Dashboard from the dropdown.
Select Use under Actions for the AgentX dashboard you want to add.
Select Choose Repos.
Select the repository that contains AgentX logs.
Select Done.
In the confirmation dialog, verify the repository selection.
Select Ok.
Repeat this procedure for each AgentX dashboard you want to add.
Expected outcome
The selected AgentX dashboards appear in your Dashboards list and display data from AgentX logs.
Verification
Go to Dashboards in the navigation bar.
Verify that the AgentX dashboards you added appear in the list.
Open a dashboard to verify it displays data from your AgentX logs.
If dashboards show no data:
Verify AgentX is collecting logs from endpoints
Verify logs are being stored in the selected repository
Wait a few minutes for data to populate after initial configuration
Available AgentX dashboards
LP_AgentX - Agents Overview Displays agent status, operating system distribution, active connections, top processes, and system information across all monitored endpoints.
LP_AgentX - Endpoints Compliance - PCI DSS Shows PCI DSS compliance status with high-severity triggers, requirement violations, and recent compliance events.
LP_AgentX - Endpoints NIST Compliance Displays NIST 800-53 compliance status with control violations, rule triggers, and compliance tracking.
LP_AgentX - File Integrity Management Visualizes file and registry changes, including top modified files, deleted files, changed attributes, and threat intelligence matches.
LP_AgentX - Rule Triggers Overview Shows alert trends, top triggering endpoints, MITRE ATT&CK vectors, and high-severity security events.
LP_AgentX - Security Configuration Assessment Displays security configuration scan results, CIS benchmark compliance, failed benchmarks, and remediation recommendations.
Next steps
Last updated
Was this helpful?