Fortinet white logo
Fortinet white logo

Administration Guide

Threats

Threats

Threats includes the following widgets:

Threat Map

Threats happening across the world.

By default, the threats are displayed in Realtime. Open the settings for the widget to filter the time, source, and destination.

Top Threat Destinations

A world map, spinning 3D globe, or table showing the top 10, 20, 50, 100 threat destinations.

On the map view, hover the cursor over data points to see the source device and IP address, destination IP address and country, threat level, and the number of incidents (blocked and allowed).

Top Threats

The top threats to your network. Hover the cursor over data points to see the threat, category, threat level, threat score (blocked and allowed), and the number of incidents (blocked and allowed).

The following incidents are considered threats:

  • Risk applications detected by application control
  • Intrusion incidents detected by IPS
  • Malicious web sites detected by web filtering
  • Malware/botnets detected by antivirus

Top Threats by Weight & Count

The top threats by weight and count to your network from risk applications, intrusion incidents, malicious websites, and malware/botnets.

Top Virus Incidents Over Time

The top virus incidents over time.

Threats

Threats

Threats includes the following widgets:

Threat Map

Threats happening across the world.

By default, the threats are displayed in Realtime. Open the settings for the widget to filter the time, source, and destination.

Top Threat Destinations

A world map, spinning 3D globe, or table showing the top 10, 20, 50, 100 threat destinations.

On the map view, hover the cursor over data points to see the source device and IP address, destination IP address and country, threat level, and the number of incidents (blocked and allowed).

Top Threats

The top threats to your network. Hover the cursor over data points to see the threat, category, threat level, threat score (blocked and allowed), and the number of incidents (blocked and allowed).

The following incidents are considered threats:

  • Risk applications detected by application control
  • Intrusion incidents detected by IPS
  • Malicious web sites detected by web filtering
  • Malware/botnets detected by antivirus

Top Threats by Weight & Count

The top threats by weight and count to your network from risk applications, intrusion incidents, malicious websites, and malware/botnets.

Top Virus Incidents Over Time

The top virus incidents over time.