The Monarx Dashboard provides a high-level view of your entire infrastructure’s security health. It is designed to help hosting partners and system administrators identify active threats, track agent health, and identify revenue opportunities through security upselling.
📆 Global Time-Based Filtering
At the very top of the dashboard, you will find the Time Range Selector. This allows you to define the scope of the data displayed across every module and graph on the page.
Available Filters: You can toggle between the Last 3 Days, Last 7 Days, Last 14 Days, and Last 30 Days.
Dynamic Adjustment: When you select a new timeframe, every section of the dashboard—from the Antivirus charts to the Infected User lists—will instantly adjust to reflect only the data from that period.
Default View: By default, the dashboard displays data for the Last 30 Days to give you a comprehensive month-over-month perspective on your security status.
1. Antivirus Overview
The Antivirus section provides a historical perspective on your file-system security. This chart visualizes the lifecycle of the threats we encounter:
Malicious: Total number of purely malicious files (e.g., web shells).
Compromised (Injected): Clean files that have had malicious snippets injected into them.
Quarantined: Files moved to a secure location to prevent execution.
Cleaned: The total count of files restored to their original, safe state.
2. Top 5 Malware Types
This bar graph provides a breakdown of the specific Malware Families targeting your servers. By identifying whether you are dealing with common CMS exploit kits, phishing scripts, or backdoors, you can better understand the current threat landscape and adjust your security posture accordingly.
3. Server Agents Summary
The Server Agents module acts as a health check for your Monarx deployment across the fleet. It displays:
Total Users: All users detected across all servers under your company account.
Online Agents: Currently active and communicating agents.
Outdated Agents: Agents requiring a version update to ensure peak protection.
Offline Agents: Agents that have lost connection and require immediate investigation.
4. Firewall (Beta)
The Firewall section is divided into two distinct protection layers:
SmartWAF (Beta): Available only to users who have enabled this feature, this displays network-layer events. It tracks and logs traffic-based attacks that are blocked before they even reach your web applications.
ThreatShield (RASP): This is our Runtime Application Self-Protection layer specific to PHP. It monitors the execution of scripts in real-time and provides data on Logged, Blocked, and Detected events over a selected timeframe.
5. Most Infected Servers
This table identifies the "hot zones" in your infrastructure. It lists the Top 5 Servers based on the volume of malicious and compromised files.
Summary Stats: View a quick count of Malicious vs. Injected files per server.
Upsell Leads: A dedicated download option for hosting partners. This report identifies which servers are most at risk, providing a data-driven list of clients who would benefit from upgraded security and automated cleanup services.
6. Most Infected Users
Focusing on individual accounts, this section highlights the Top 5 Infected Users across your entire server fleet.
Per-User Breakdown: Shows the specific count of malicious and compromised files associated with these accounts.
Upsell Leads Report: This report is specifically designed for partners to target users with the lowest security posture, allowing you to offer personalized security interventions or premium cleanup plans.
💡 Dashboard Tip
Use the "Upsell Leads" reports in sections 5 and 6 to transform your security data into a growth engine for your hosting business. These reports highlight exactly where your customers need the most help.






