Threats by Topology
Go to Dashboard > Threats by Topology. It combines both device and threat information together.
Devices (or input sources) are displayed in separated top level circles and the threats that occur on them are displayed inside them as second level circles. The radius of threat circle is proportional to threat event counts. Threat circles can be multiple levels and each level represents a subnet level.
Clicking on the circles will drill down to the host level. At the host level, clicking on a circle will display a new page to show threat details.
There are host and time range filters in the toolbar on top.
The following options are available:
Hosts |
Select the host. |
Time Period |
Select the time period from the dropdown list. Select 24 Hours, 7 Days, or 4 Weeks. |
Toggle Light |
Select Toggle Light to change the topology background color. |
Toggle Network Alert Data |
Select to toggle and include Network Alert data from sniffed traffic. |