Security incident monitoring Security managers can pinpoint areas of concern using high-level graphical interfaces. Security Incident Response OverviewThe Security Incident Response Overview provides an executive view into security incident activity, providing trends and reports, and drill-down into specific data. When the Security Incident Analytics plugin is activated, users with certain roles can view data of interest to the Chief Information Security Officer (CISO).Security Incident Response CISO dashboardThe Security Incident Response CISO dashboard provides four views into security incident activity, vulnerability trends, security profiles, and business risk profiles.Security Incident Response ExplorerThe Security Incident Response Explorer provides a graphical view into security incident activity. It is provided with the base system. When the Security Incident Analytics plugin is activated, users can view filtered data. Security incident treemapsWhen the Security Incident Analytics plugin is activated, you can add the security incident - service impact and security incident - real-time treemaps to the Security Incident Response overview. After they have been added, you can configure the treemaps by modifying treemap categories and indicators.Security incident mapThe security incident map provides data by geographical location. The world map is highlighted in every area in which an incident occurs. When the Security Incident Analytics plugin is activated, you can add the security incident map to the Security Incident Response overview. After it has been added, you can configure the map by modifying the map filters.Content packs for Security Incident ResponseContent packs contain preconfigured best practice dashboards. The dashboards present important metrics for analyzing your Security Incident Response process, such as new security incidents or the average age of open security incidents.Identify all configuration items affected by a security incidentIf you know which resource (server, desktop or other configuration item) is behind a security incident and want to identify related resources and business services that can be affected, you can use the Business Service Management (BSM) map.