Suspicious Activities

The Suspicious Activities dashboard helps detect and remediate issues related to unmanaged devices, suspicious connections, and traffic outside norms in the network.

Suspicious Connections

These visualizations provide an overview of suspicious applications, port spoofing, and connections aids in detecting and responding to security threats by identifying potential risks and enabling timely mitigation.

Visualizations

Overview

Top Suspicious Sessions

Displays suspicious applications or protocols—such as SSH, RDP, Telnet, and FTP based on user activity.

Port Spoofing Activity

Displays applications or protocols running on non-standard ports.

List of Suspicious Remote Sessions

Displays session details for applications such as FTP, SMB, Dropbox, TFTP, SSH, and more.

Unmanaged Endpoints

These visualizations enhance visibility and control of IoT devices by enabling the identification of unmanaged devices, monitoring their activities, and addressing potential security vulnerabilities.

Visualizations

Overview

Number of unmanaged host sessions

Displays the total number of unmanaged host sessions.

Applications

Displays the distribution of IoT applications based on endpoint activity.

IoT Traffic Overview

Displays a timeline chart of IoT traffic.

Top IoT Destinations

Displays the top IoT destinations ranked by active IoT applications.

Top IoT Sources

Displays the top IoT sources ranked by active IoT applications.

Top IoT Endpoints

Displays the top IoT sources ranked by endpoint activity.