Category | Event Types | Criteria | Time allowed |
---|---|---|---|
Network Security | URL Threat Filter | Number of times connection attempts to or from a site in an URL threat category detected and blocked is greater than the threshold | 60 minutes |
Network Security | IP Reputation-Incoming | Number of times packets coming from an IPv4 address with bad reputation occurred is greater than the threshold | 10 minutes |
Network Security | IP Reputation-Outgoing | Number of times connection attempt to an IPv4 address with bad reputation occurred is greater than the threshold within | 60 minutes |
Network Security | Sandboxing malicious file | Number of malicious files destroyed is greater than the threshold | 5 minutes |
Network Security | Sandboxing suspicious file | Number of suspicious files destroyed is greater than the threshold | 5 minutes |
Network Security | DNS Filter | Number of times connection attempt to a FQDN that is blocked or in the threat category | 60 minutes |
Network Security | Attack counts | Number of highest severity attacks greater than the threshold | 5 minutes |
Network Security | Attack counts | Number of attacks greater than the threshold | 5 minutes |
Network Security | Malware/virus detection | Malware or virus attack count greater than the threshold | 5 minutes |
Network Security | Malware/virus detection | Number of times the same malware/virus is detected greater than the threshold | 15 minutes |
Network Security | Alert counts | Number of alerts greater than the threshold | 1 minute |
Device | Online status | Device offline for more than {threshold} minutes | 15 minutes |
Device | Reboot | Reboot | – |
Device | Concurrent sessions | Session numbers greater than the {threshold} % | – |
Anomaly | Login failure | Number of login failures over threshold | 1 minute |
Anomaly | Traffic anomaly | Number of scans/floods detected greater than the threshold | 5 minutes |
Anomaly | Protocol anomaly | Number of TCP/UDP/ICMP/IP decoders greater than the threshold | 5 minutes |
Label | DESCRIPTION |
---|---|
Alert Severity (Hits) | Use this interactive graph to view trends in the severity of all the alerts that have been triggered on the network. The event severity classifications are as follows: High severity – Events that are exceptionally harmful, such as attacks by viruses [OR: 10 potential malware attacks within 5 minutes] Medium severity – Events that could collect users’ personal information or adversely affect the network [OR: 2 potential malware or virus attacks within 15 minutes] Low severity – Events that usually have no adverse effect on a network. Trend lines for all security classifications appear on the graph by default. Click on a color block to hide its corresponding trend line. |
Severity Alerts | This table shows a list of recent security events. |
Time | This displays the year-month-date hour:minute:second that the threat occurred. |
Category | This displays the alerts by category. |
Event type | This displays the type of alert that was triggered. Examples of alert types are IPS, Spam, Virus and Web. |
Severity | This displays the severity level as outlined in Threat History. |
Description | This displays the further information on this alert. |