Document toolboxDocument toolbox

Threats tab

This tab shows the frequency and distribution of threats detected in the company based on the information provided by the configured alerts, and also displays incoming threats to the network.

Using the time travel option at the top, it is possible to apply a time filter to the widgets in the tab in order to inspect activity at an earlier date. You can select a specific period or day using the time buttons and the calendar. Then select Apply interval and all widgets will be updated immediately.

Alternatively, you can select either a single day or a time period using the time travel filter controls. There are buttons for selecting recent periods or calendar controls to select specific dates.

Malware and fraud trends 

The top part of this tab includes general malware and fraud trends by day, week and month. You can also find two tables that list the IP addressed identified as attempting fraud or malware over the last 24 hours, and a line chart representing the fraud and malware connection attempts over the same period.

Fraud threats

In this area you can check the daily distribution of threat types over the last 30 days through a stacked column bar and the monthly proportion of threat types in a pie chart.

Select the Expand section option to display a punch card chart showing the distribution of fraud attacks by type and day over the last 30 days.

Malware threats

In this area you can check the daily distribution of types of malware attacks over the last 30 days through a stacked column bar and the monthly proportion of malware attack types in a pie chart.

Select the Expand section option to display a punch card chart showing the distribution of malware attacks by type and day over the last 30 days.

Incoming threats

The three widgets in this area show incoming threats to the network. First, there is a map representing the geographic locations of source IP addresses identified as incoming threats and a Voronoi diagram that groups the incoming threats detected by ISP and ASN. Below these widgets you have a graph where you can check incoming threats classified by source and destination IP addresses.