Applied Epic Dashboards: IT/Operations Managers

Applied Epic Dashboards for IT and Operations Managers

Epic Dashboards offer a novel approach to presenting agency data. They are designed to complement, rather than replace, Epic Reports by providing visual representations and an overview of trends within your agency. Additionally, they enable users who may not have access to Epic Reports to view their data effectively.

Our blog series on Applied Epic Dashboards continues with an emphasis on the IT/Operations Manager role. The role of IT/Operations Manager and the associated Dashboard emphasize data trends in various domains, including security access, user logins, invalid or inactive accounts, among others. This blog encompasses the Data Quality, Epic Login, Epic Security, and Risk Map Dashboards.

But First, Some Reminders about Applied Epic Dashboards:

Access to Epic Dashboards is determined by your current Epic package. It is available in the Premium and Professional packages. You also have access to them if you currently have access to Applied Analytics. If you have a Pro/Premium bundle, anyone with an Applied Community Login can opt-in to request access. For additional information, refer to our Applied Epic Dashboards Introduction blog.

At the top of each dashboard page, it is possible to filter data according to different time periods, structures, and various transactional views of policy data. Default filters for each dashboard can also be saved. 

Need policy management-related data? Visit the Department Manager Dashboard.

The latest Release of Epic includes a Dashboard Menu for easier navigation. Previously, users had to use the Folders to navigate to other Dashboards and Roles.

Applied Epic Dashboards Navigation Menu

Data Quality Dashboard

IT Operations Manager Data Quality Dashboard

Unlike the other roles that begin on a Pulse Dashboard, those assigned the IT/Operations Manager role begin on the Data Quality Dashboard. This Dashboard gives an overview of security changes, login trends, and select invalid data points relating to configuration/system administration.

  • Security trend – last 30 days: Displays the trend of security changes made in Configure > Security over the past 30 days. Clicking a data point on the line graph will display a list of security changes for that date, complete with the user who made the change. Clicking the tile header opens the Epic Security Audit Dashboard.
  • Login trend – last 24 hours: Displays the trend of logins over the past 24 hours, both successful and unsuccessful. Clicking a data point on the line graph will display a list of all login attempts, including User Code and Name, Database Name, Login Date, and Machine IP. Clicking the tile header opens the Epic Login Dashboard.
  • Activity records with invalid employee: Shows both the count and percentage of open activities with a blank, invalid, or inactive employee as the Who/Owner. Clicking the count will display the individual activities.
  • Lines in effect with invalid servicing employees: Shows both the count and the percentage of policy lines in force with a blank, invalid, or inactive employee on the Servicing tab. Clicking the count will display the individual lines.
  • Contacts opting out of preferred marketing method: Shows the number of contacts who have opted out of receiving marketing mail, email, fax, or phone calls. This data pulls from the Do Not Market checkbox found in the Contact Detail of a client account. Clicking the count will display the contact list.
  • Clients with mismatched types of business assigned: Shows the number of clients with a box checked in the Type of Business area of Account Detail without an active policy associated with that type of business (as defined in Configure > Policy > Type). Clicking the count will display the individual clients.
  • Lines in effect with invalid issuing company: Shows both the count and percentage of policy lines in force with a blank, invalid, or inactive Issuing Company on the Line tab. Clicking the count will display the individual lines.
  • Main business contact with blank industry: Shows the number of Main Business Contacts that are missing both the NAICS and SIC codes in the header of Contact Detail on the client account. Clicking the count displays the individual contacts.

Epic Login Dashboard

IT and Operations Epic Login Dashboard

The Epic Login Dashboard provides a deep dive into attempted and successful logins in your Epic database. Whereas the Data Quality Dashboard only shows logins within the past 24 hours, the Epic Login Dashboard provides a Period Selector filter at the top. (Don’t forget to click the Refresh button to update the data).

  • Login attempts by response: Shows a pie chart breaking down valid and invalid login attempts within the time frame. Clicking each section will display the list of valid or invalid attempts, along with the User Code and Name, Database Name, Login Date, and Machine IP.
  • Successful login – top 10: Shows a bar chart with the 10 users with the most successful logins within the time frame. Clicking the bar will display the list of valid attempts, along with the User Code and Name, Database Name, Login Date, and Machine IP.
  • Login attempts: Shows a list of the login attempts within the time frame, along with the User Code and Name, Database Name, Login Date, and Machine IP.
  • Login trend – last 24 hours: Displays the trend of logins over the past 24 hours, both successful and unsuccessful. Clicking a data point on the line graph will display a list of all login attempts, including User Code and Name, Database Name, Login Date, and Machine IP. This is the same tile found on the Data Quality Dashboard.

Epic Security Audit Dashboard

Epic Security Audit Dashboard

The Epic Security Audit Dashboard provides a deep dive into the security changes made in Configure over the last 30 days. As an important note, Epic Reports provides visibility only into existing security settings, rather than real-time changes. In contrast, Epic Dashboards enable users to view real-time security modifications and identify the individuals responsible for those changes.

  • Security changes – top 5: Shows a bar chart of the top 5 users and security groups changed in Configure > Security. Clicking a bar will display the list of security changes for that date, complete with the user who made the change.
  • Security changes by type: Shows a pie chart breaking down security changes by Users, Security Group, and Logins in Configure > Security.
  • Security changes: Shows a detailed list of security changes within the last 30 days, complete with the user who made the change.
  • Security trend – last 30 days: Shows a line graph totaling the number of security changes by day. Clicking a data point displays a list of the changes, complete with the user who made the change.

Risk Map

IT Operations Manager Risk Map Dashboard

The Risk Map is identical to the Risk Map for other roles’ Dashboards. Data is pulled from ACORD forms and Custom forms.

  • Risk Map: An interactive Google map of risks within the agency’s book of business. Zoom in or out and click on the map pin to identify the client(s) and policies in that location.
  • Risk Details: A list of all in effect policies in the agency’s book of business.

Getting the Most from Your Applied Epic Experience

The Agency Consulting team here at Kite Technology Group is here to help you harness the full potential of Applied Epic. If you have any questions about Applied Epic Dashboards (or any other Applied Epic questions), reach out to our teamFrom Applied Epic optimizations and workflow development, to accounting and bookkeeping services, our team has the experience needed to help your agency achieve its business goals.

Picture of Jenny Honican

Jenny Honican

Agency Consultant
Kite Technology Group