Suspicious Activities
The Suspicious Activities dashboard helps detect and remediate issues related to unmanaged devices, suspicious connections, and traffic outside norms in the network.
Suspicious Connections
These visualizations provide an overview of suspicious applications, port spoofing, and connections aids in detecting and responding to security threats by identifying potential risks and enabling timely mitigation.
Visualizations |
Overview |
---|---|
Top Suspicious Sessions |
Displays suspicious applications or protocols—such as SSH, RDP, Telnet, and FTP based on user activity. |
Port Spoofing Activity |
Displays applications or protocols running on non-standard ports. |
List of Suspicious Remote Sessions |
Displays session details for applications such as FTP, SMB, Dropbox, TFTP, SSH, and more. |
Unmanaged Endpoints
These visualizations enhance visibility and control of IoT devices by enabling the identification of unmanaged devices, monitoring their activities, and addressing potential security vulnerabilities.
Visualizations |
Overview |
---|---|
Number of unmanaged host sessions |
Displays the total number of unmanaged host sessions. |
Applications |
Displays the distribution of IoT applications based on endpoint activity. |
IoT Traffic Overview |
Displays a timeline chart of IoT traffic. |
Top IoT Destinations |
Displays the top IoT destinations ranked by active IoT applications. |
Top IoT Sources |
Displays the top IoT sources ranked by active IoT applications. |
Top IoT Endpoints |
Displays the top IoT sources ranked by endpoint activity. |