Skip to content

Charts & Analytics

The Charts & Analytics section of the Nyroxis Dashboard transforms raw security events into visual insights, helping users quickly understand trends, anomalies, and potential risks.
All analytics are generated locally, preserving full privacy.


Purpose of Visual Analytics

Charts help users answer key questions immediately: - Is activity increasing or decreasing over time?
- Are there unusual spikes in processes or network traffic?
- Which event categories occur the most?
- Are there recurring suspicious patterns?

Visuals make complex data simple to understand.


Available Chart Types

1. Event Frequency Over Time

Shows how many events occur: - Hourly
- Daily
- Weekly

Useful for spotting spikes, bursts of activity, or unexpected quiet periods.


2. Top Event Sources

Highlights which processes, files, or network endpoints generate the most events.

Examples: - Most active processes
- Most accessed files
- Most frequent network connections


3. Severity Trend

Tracks the evolution of: - Informational events
- Warnings
- High-risk or critical activity

Helps users detect escalation before a compromise occurs.


4. Special Security Indicators

Nyroxis provides dedicated charts for high-value signals: - Suspicious process chains
- Repeated failed connections
- Access to sensitive locations
- Privilege-related events

These visuals help identify early signs of malicious behavior.


Local Analytics Engine

All charts are powered by the local analysis engine: - No cloud
- No external APIs
- All computation stays on the device

Charts are generated directly from the encrypted local database.


️ Interactivity

Charts support: - Hover details
- Zooming (optional)
- Filtering by time range
- Category selection

Designed for both simple and advanced usage.


Privacy & Offline Operation

Nothing is sent to external services — ever.
Analytics are computed and rendered locally from encrypted events.


Summary

Charts & Analytics provide a visual, privacy-preserving way to understand system activity, detect anomalies, and gain immediate insights into device security.

© Nyroxis Documentation — Nyroxis® Endpoint Intelligence Platform
Built with MkDocs Material — Documentation auto-generated from public modules.