Overview
At this stage, administrators move beyond initial setup to confirm that the VPN is operating correctly and begin using Scout’s dashboard to monitor secure connections. This level focuses on visibility; knowing which devices are connected, when they last communicated, and whether data is flowing securely through Scout’s encrypted network.
VPN Health & Connectivity
Scout automatically tracks VPN status for each router and peer device connected to your organization.
Key indicators appear in the Devices Overview and Dashboard pages:
- Online Status: Shows whether a router or peer is actively connected to the VPN.
- Last Seen: Displays the most recent time the device communicated through Scout’s network.
- ECS IP: Identifies the encrypted control subnet assigned to each connected system.
If a device’s status remains offline for an extended period, check local power, cabling, or internet connectivity before escalating to support.
Monitoring Network Activity
Once the VPN is stable, Scout begins recording and displaying data across several metrics:
- Devices Online: Shows the number of active peers across the organization.
- Threats Detected vs Blocked: Tracks network events identified through VPN traffic inspection.
- Active Incidents: Lists ongoing investigations or unresolved alerts tied to VPN-connected devices.
These metrics provide the first layer of visibility into network health and emerging threats.
Interpreting What You See
- A steady count of connected devices with minimal incident activity typically indicates a healthy and stable VPN.
- Frequent connect/disconnect cycles or missing “last seen” timestamps can signal local connection issues or misconfigured peers.
- An increase in blocked traffic or incidents may suggest that malicious or misrouted traffic is being properly contained.
Understanding these relationships helps administrators prioritize which issues to investigate.
Best Practices
- Review VPN connectivity daily or weekly depending on organization size.
- Verify that all expected routers and peers appear in the Devices list.
- Use the Audit Log to confirm when new peers are added or removed.
- Treat missing or offline devices as potential security gaps until verified.
- Document baseline connection counts and behaviors to recognize anomalies faster.
Maturity Progress
By completing this level, administrators achieve consistent visibility into VPN activity and connected assets.
This prepares the environment for Level 3 — Access Policy Control 🟠, where administrators begin enforcing connection rules and managing device-level permissions.