Enhanced Duo Dashboard, Reports & Logs for Better Visibility Into Authentications
Customers trust Duo to protect their users, applications, and devices from breaches. Over the past several months, we’ve released a set of analytics-focused enhancements to provide customers data on how Duo is protecting them. These enhancements are designed to work together to surface actionable information and enable further analysis.
We’re excited to highlight them here.
A New Dashboard: Key Performance Indicators
We overhauled the dashboard of the Admin Panel based on extensive user research. The new dashboard is designed to highlight key performance indicators for a customer’s account.
Figure 1: New Dashboard Focusing on Actionable KPIs
You can use the dashboard to understand the health of devices, authentications and users at a glance. Each segment of the dashboard is clickable and redirects you to the relevant report, log or entity. For example, clicking on “Bypass Users” links to a list of users who are currently set to bypass two-factor authentication (2FA).
New Reports: Authentications and Deployment Progress
We’ve developed three new reports that you can access via links on the sidebar and the new dashboard:
- Authentication Summary
- Denied Authentications
- Deployment Progress
Where applicable, we’ve made each report filterable to a specific time range, user, group or application. And just like the dashboard, each segment of the reports is clickable, leading you to the relevant log or entity.
Figure 2: Report Filters
The Deployment Progress report allows customers to understand their user population, by answering the following questions:
- How many users exist relative to purchased licenses?
- What percentage of users are enrolled with a 2FA device?
- What percentage have successfully authenticated?
Each of these segments is clickable revealing the list of users in that state.
Figure 3: Deployment Progress Report
The Authentication Summary and Denied Authentications reports answer the question, “How well are authentications proceeding?” Use the Authentication Summary report to examine overall trends and the Denied Authentications report to examine specifics about the unsuccessful authentications.
For example, the Authentication Summary report highlights the most used second factor method in a given time period. This graph can be used to gather data to nudge users toward Duo Push or U2F tokens, helping you reduce telephony spend. Click on a factor to view authentications for that method on the Authentication Log.
Figure 4: Top Authentication Factors
A New Authentication Log
Finally, we’ve overhauled our Authentication Log. In addition to flexible filtering, the log itself is updated to provide easily digestible, important information about the authentication.
In the example below, it’s noted that the access device is not a Trusted Endpoint, that is, it doesn’t have a Duo certificate. This information can help inform a decision to set up an access policy to block access to this application by devices that aren’t company managed.
Figure 5: Authentication Log Expanded on Access Device Information
With these new data enhancements, we hope to demonstrate our dedication to protecting our customers, their authentications, users, devices and applications. Our newly updated dashboard, reports and Authentication Log work together to surface actionable information, provide filtering and enable follow-up analysis. Dig in and enjoy!