Statistics Widget
The Statistics widget displays a top-ten list for a selected metric, surfacing the most active users, devices, applications, or vulnerabilities in your environment. Use this widget to quickly identify high-risk entities — for example, the users with the most security findings, the devices with the most vulnerabilities, or the most commonly occurring CVEs.

Configuration
Click + Add Widget, select Statistics, and click Next.

Field | Required | Description | Default |
Widget Name | Yes | A title (e.g., 'Users with Most Security Findings'). | — |
Time Range | No | Period for gathering measurements. | Use Global |
Statistic | No | Which top-ten list to display. See Available Statistics below. | — |
Available Statistics
Choose the metric that aligns with your monitoring priority:

Statistic | What It Shows | Use Case |
Users with the Most Security Findings | Top 10 users ranked by total finding count. | Identify users generating the most alerts — possible compromised accounts. |
Devices with the Most Security Findings | Top 10 devices ranked by total finding count. | Find the noisiest or most compromised endpoints. |
Highest Severities | Top 10 items ranked by severity level. | Focus attention on the most critical issues. |
Highest Severities from DataBee | Top 10 by DataBee-calculated severity. | Uses DataBee's enriched severity scoring. |
Devices with New Possible Owners | Devices where DataBee identified potential new owners. | Review ownership suggestions from entity discovery. |
Users with Ownership of the Most Devices | Users ranked by device count. | Understand ownership concentration. |
Potential Application Owners | Users identified as potential app owners. | Review app ownership recommendations. |
Users with Most Applications | Users ranked by associated application count. | Identify users with the largest application footprint. |
Devices with Most Applications | Devices ranked by installed application count. | Find devices with the most software — potential attack surface. |
Users with Most Vulnerabilities | Users ranked by vulnerability count. | Focus remediation on the most exposed users. |
Devices with Most Vulnerabilities | Devices ranked by vulnerability count. | Prioritize patching on the most vulnerable endpoints. |
Applications with Most Vulnerabilities | Applications ranked by vulnerability count. | Identify the riskiest software in your environment. |
Most Common Data Quality Alerts | Top data quality issues across feeds. | Troubleshoot data ingestion problems. |
Most Common Vulnerabilities | Most frequently occurring CVEs. | Understand which vulnerabilities affect the most entities. |
Owners of Entities With Vulnerabilities | Owners responsible for the most vulnerable entities. | Drive accountability for vulnerability remediation. |
Interactive Features
- Click on any user, device, or entity name to navigate to their detail page.
- The list updates automatically based on the widget's time range setting.