Fortinet white logo
Fortinet white logo

Administration Guide

Threats by Topology

Threats by Topology

Go to Dashboard > Threats by Topology. It combines both device and threat information together.

Devices (or input sources) are displayed in separated top level circles and the threats that occur on them are displayed inside them as second level circles. The radius of threat circle is proportional to threat event counts. Threat circles can be multiple levels and each level represents a subnet level.

Clicking on the circles will drill down to the host level. At the host level, clicking on a circle will display a new page to show threat details.

There are host and time range filters in the toolbar on top.

The following options are available:

Hosts

Select the host.

Time Period

Select the time period from the dropdown list. Select 24 Hours, 7 Days, or 4 Weeks.

Toggle Light

Select Toggle Light to change the topology background color.

Toggle Network Alert Data

Select to toggle and include Network Alert data from sniffed traffic.

Threats by Topology

Threats by Topology

Go to Dashboard > Threats by Topology. It combines both device and threat information together.

Devices (or input sources) are displayed in separated top level circles and the threats that occur on them are displayed inside them as second level circles. The radius of threat circle is proportional to threat event counts. Threat circles can be multiple levels and each level represents a subnet level.

Clicking on the circles will drill down to the host level. At the host level, clicking on a circle will display a new page to show threat details.

There are host and time range filters in the toolbar on top.

The following options are available:

Hosts

Select the host.

Time Period

Select the time period from the dropdown list. Select 24 Hours, 7 Days, or 4 Weeks.

Toggle Light

Select Toggle Light to change the topology background color.

Toggle Network Alert Data

Select to toggle and include Network Alert data from sniffed traffic.