Incidents
Attack events are aggregated into incidents based on common characteristics, allowing you to quickly identify frequent attack types, the most malicious source IP addresses, and more.
Selecting an incident reveals details such as the attack type, target application, and source IPs.
You can filter the displayed Incidents by the Last detected time, App Name, Attack Type, CVE ID, Device, Host, Incident ID, Source Country, Source IP, and Tag.
Incident Organization
You can add tags with predefined labels to mark incidents, which updates their status icons for easier tracking. These labels are for your reference only and do not affect the system’s threat detection but help with organizing incidents for sorting, filtering, and acknowledgment. Tag names can also be edited to suit your needs.
Additionally, you can use the Comments link under Incident Details to add notes to an incident.
Additional Incident Details
You can access additional information on the selected incident by scrolling down Incident Details clicking More Details.
When you click on any detail category on this page (except for Threat Sample), a table is displayed showing the information described below, along with the corresponding threat count and block/monitor ratio. The block count indicates how many transactions were blocked, while the monitor count represents the total number of transactions detected for this incident.
| Detail Category | Descripion |
|---|---|
| Policy Name |
The name of the afflicted application. |
| Attack Type |
The type of attack(s) detected by Threat Analytics. Examples include SQL Injections, Cross-Site Scripting, and Trojans Attacks. |
| Countries |
The countrie(s) from which attacks in the recorded incident originate. |
| Hosts | The host(s) of the afflicted application. |
| IPs | The Client IP address(es) from which the attack came from. |
| URLs | The URL(s) on your domain where the attacks occurred. |
| CVE IDs |
The CVE ID(s) associated with the incident. If no CVE ID is associated with this attack, this will display as N/A. |
| OWASP Top 10 |
The OWASP Top 10 risk(s) associated with the incident. The OWASP Top 10 is a list of the most critical security risks to web applications, published by the Open Web Application Security Project (OWASP). |
| Threat Sample |
This page lists out each detected transaction within the incident and lists out its description, Action, Client IP address, URL, and date detected.
|