IBM Cloud Docs
Workload Protection Dashboard Overview

Workload Protection Dashboard Overview

The previous sections provided an overview over the functions Workload Protection offers, how to deploy an instance, and how to install the agent on linux hosts and connect it as a data source. This section provides a brief overview over the sections of the IBM Cloud Security and Compliance Center Workload Protection dashboard.

Features

The features Workload Protection offers can be split into three main categories:

  • Host scanning
  • Posture management
  • Threat detection

Below you find the brief introduction to each of them.

Access the Workload Protection Dashboard

To check out these features, you need to open the Workload Protection dashboard.

  1. Open the IBM Cloud dashboard.

  2. Click the Navigation menu icon Navigation menu icon > Security > Resources

  3. From the list, select your Workload Protection instance and click on it.

  4. In the instance, click on Open Dashboard

Host scanning

Host scanning can be used to find and prioritize software vulnerabilities.

1, After you open IBM Cloud Security and Compliance Center Workload Protection, click Vulnerabilities > and then click Runtime. You can see the systems that are being scanned.

  1. Click the instance name to review the details. From the Vulnerabilities page, you can filter by various criteria, for example, filter by ‘Has fix’.
  2. You can download a PDF report, or you can click Vulnerabilities > Reporting to build the report.

Posture management

To explore posture management, click Compliance. You can also click Inventory and check the posture for each inventory item. These resources include both, cloud resources, and standalone hosts that you connected through the Workload Protection agent.

Cloud resources only show up in this list when CSPM was enabled during instance creation.

Threat detection

  • You can look at Threats -> Host or other platforms depending where you set up the agents.

  • You can also look at Integrations -> Sysdig Agents.

Additional Resources