Fortinet Document Library

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:


Table of Contents

Administration Guide

Threats widgets

Threats includes the following widgets:

Threat Map

Threats happening right now across the world.

Top Threat Destinations

A world map, spinning 3D globe, or table showing the top 10, 20, 50, 100 threat destinations.

On the map view, hover the cursor over data points to see the source device and IP address, destination IP address and country, threat level, and the number of incidents (blocked and allowed).

Top Threats

The top threats to your network. Hover the cursor over data points to see the threat, category, threat level, threat score (blocked and allowed), and the number of incidents (blocked and allowed).

The following incidents are considered threats:

  • Risk applications detected by application control
  • Intrusion incidents detected by IPS
  • Malicious web sites detected by web filtering
  • Malware/botnets detected by antivirus

Top Threats by Weight & Count

The top threats by weight and count to your network from risk applications, intrusion incidents, malicious websites, and malware/botnets.

Top Virus Incidents Over Time

The top virus incidents over time.

Threats widgets

Threats includes the following widgets:

Threat Map

Threats happening right now across the world.

Top Threat Destinations

A world map, spinning 3D globe, or table showing the top 10, 20, 50, 100 threat destinations.

On the map view, hover the cursor over data points to see the source device and IP address, destination IP address and country, threat level, and the number of incidents (blocked and allowed).

Top Threats

The top threats to your network. Hover the cursor over data points to see the threat, category, threat level, threat score (blocked and allowed), and the number of incidents (blocked and allowed).

The following incidents are considered threats:

  • Risk applications detected by application control
  • Intrusion incidents detected by IPS
  • Malicious web sites detected by web filtering
  • Malware/botnets detected by antivirus

Top Threats by Weight & Count

The top threats by weight and count to your network from risk applications, intrusion incidents, malicious websites, and malware/botnets.

Top Virus Incidents Over Time

The top virus incidents over time.