Your technology certification is waiting. Enroll in Cloud Class ®
Information is presented in real-time, with a configurable historical view that allows admins to quickly identify the regularity with which threats are being seen. Admins can search their organization by:
Source and/or destination IP
Potential security threats are ranked and summarized by severity, with details presented in a timeline, a pie chart, and in summary tables. For those digging for even more information, the complete list of events is also shown. The Snort Signature ID links to a detailed description, including suggested actions to remediate the threat.
Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.
Have a better answer? Share it in a comment.
Please enter a first name
Please enter a last name
Must be at least 4 characters long.
Join and Comment
In this FREE six-day email course, you'll learn from Janis Griffin, Database Performance Evangelist. She'll teach 12 steps that you can use to optimize your queries as much as possible and see measurable results in your work. Get started today!