ThreatX Dashboard

Introduction

The Dashboard, available from the navigation bar, displays essential data collected for each site in your environment under ThreatX protection. The data is live and driven by active site traffic.

Attack Dashboard

Attack Dashboard

Threat Entities

The ThreatX Attack Dashboard visualizes both malicious and benign traffic over time and allows ThreatX users to drill down and investigate attacking entities, and the responsive actions the ThreatX Platform took to protect their APIs and web applications. The Attack Dashboard is comprised of three main views: Threat Entities, Top Targets, and Threat Map. Each view provides a different perspective on an organizationā€™s attack surface.

Figure 1 Attack Dashboard Threat Entities 1024x571
Figure 1. Attack Dashboard, Threat Entities

Top Targets

The Attack Dashboard Top Targets view highlights the most frequently targeted sites and endpoints within a tenant. This view is critical for large enterprises with dozens or hundreds of sites protected by the ThreatX Platform. This view puts the most frequently and aggressively targeted sites front and center, allowing administrators to understand their risk profile, and the protection theyā€™re receiving from ThreatX.

ThreatX Attack Dashboard Top Targets 1024x521
Figure 2. Attack Dashboard, Top Targets

Threat Map

The Threat Map view, in the Attack Dashboard, provides visibility into the location of each unique entity and its associated risk. The interactive map allows the user to identify how many unique attackers are acting from each country.

Threat Map 1024x553
Figure 3. Attack Dashboard, Threat Map

API Observability

The API Defender dashboard provides visibility into endpoints discovered and protected by the ThreatX platform. API traffic analytics, error code summaries, and visualizations of API schema conformance are displayed in API Defender, as shown below in Figure 4, providing the ability to compare what API traffic is expected vs. an anomaly against your organizationā€™s API specifications. The API Defender dashboard brings together API discovery, observability, and the context needed to understand your organizationā€™s entire attack surface against what is being seen in the wild.

API Defender Endpoint Table with schema 1024x575
Figure 4. API Defender

API Discovery

ThreatXā€™s API discovery capabilities analyze and profile legitimate, suspicious, and malicious API use to discover and enumerate the endpoints as well as the traffic they serve. While monitoring API interactions in real-time, ThreatX can accurately detect real API endpoints and determine identifying attributes of their tech stacks or markup encodings.

Schema Compliance

Schema Compliance gives users the ability to upload, manage, and cross-compare which API traffic is expected according to your organizationā€™s schema vs. what is being seen in the wild. Manage your organizationā€™s API schemas within the API Defender page to gain risk visibility, simplify schema enforcement, or create API-centered protection rules.

API Defender Endpoint Details2 1024x575
Figure 5. API Defender, Endpoint Details
By default, the ThreatX platform updates the data every few seconds. You can choose to display historical data by selecting a time frame, as described in Data Controls and Filters.
Common Analytical Tasks
  • Monitor changes.

  • Review details about a specific threat.

  • Determine if traffic from an origin is to be allowed or blocked.

  • Identify unexpected usage patterns.

The Dashboard includes graphs and three tables, which are described in the following sections. Each table is a different perspective of the organizationā€™s attack surface. For detailed information about the data in the table, see Managing Threats.

Graphs

The Dashboard includes three interactive graphs.

Interactive Graphs
All Requests

Displays the total number of requests, including benign requests, within the selected time range. It also displays the average number of Requests per Second (RPS). The associated chart displays the number of requests over the selected time range.

Blocked Requests

Displays the total number of requests that were blocked within the selected time range. It also displays the average number of RPS. The associated chart displays the number of blocked requests over the time range.

Max Risk

Displays the highest system Risk Score recorded during the time range selected. The associated chart displays the maximum Risk Score at each time interval.

You can hover over a point on any graph to display the metrics at that time.

Threat Entities

The Threat Entities table offers the visibility security teams need to quickly evaluate threats prioritized by the Risk Score and Intensity, which represents the number of times rules were matched over the selected time range.

You can drill into the threat to view specific metadata of that threat, as described in Entity Details.

If you are unfamiliar with the Status icons, you can hover over the icon to see its definition.

Top Targets

šŸŽÆ Top Targets Table Description

This table focuses on the sites that are most frequently or aggressively targeted by attacks.

Entities

A column showing the number of threats that targeted the site.

Match Events

A column showing the number of times one or more rules were matched.

Status Code Summary

A field showing the number of responses for each HTTP code and a logarithmic scale to illustrate the relative difference between the numbers.

You can drill-down into a site’s endpoints, which are displayed as paths._

Threat Map

Threat Map offers visibility into the location of each unique threat and its associated risk. The interactive map allows the user to identify how many unique attackers are acting from each country. You can hover over a country on the map, and a pop-up displays the number of attacking threats originating in that country.

Data controls and filters

The ThreatX dashboard pages offer the following controls and filters that you can use to focus on specific data.

šŸ“„ Dashboard Pages
Site group

If your ThreatX platform organizes sites into groups, you can choose which group to view. You can view one site group or all site groups.

Sites

You can display the data for one or all sites.

Tenant

If your ThreatX platform has many tenants and your account has permission, you can choose which tenant to view. You can view one tenant only at a time.

Live

Refreshes the data.

Time range

Choose the time frame to view the data. You can choose a relative time frame, such as the last 12 hours, or an absolute time frame. The time range you select for each page affects the data shown on that page.

image 3
Figure 6. Dashboard page filters
image 4
Figure 7. Match event increase of 30%

Some data in the various tables include a percentage with an arrow. The value indicates a change in the data relative to the baseline reporting period, which is 7 days before the selected time range.

For example, when you select a 12-hour time range, the baseline period is the same 12-hour period from 7 days previous. The arrow indicates an increase or decrease in value. The following figure shows an increase in the number of Match Events of 30%.

Allow, deny, and block lists

You can use the following lists to always deny, temporarily block, or always allow specific entities. An entity is a specific IP address or IP group. A suspicious entity is a threat.

šŸ“‹ Lists
Blacklist

Permanently prevents an entities from interacting with any of your sites.

Blocklist

Prevents an entities from interacting with any of your sites for 30 minutes. Request tracking continues during the block period.

Whitelist

Entities on the whitelist are always allowed to interact with your sites.

You can add an entity as an IP address or CIDR to any of the lists manually, as described in Managing Threats. You should exercise caution when manually adding a threat to the Blacklist or Whitelist to prevent a problem with legitimate traffic or always allowing malicious traffic.

If the ThreatX Risk-Based Blocking feature is enabled, the ThreatX platform can add a threat automatically to the Blacklist or Blocklist based on the threatā€™s behavior. The ThreatX behavioral analytics engine, hackerMindā„¢, blocks persistently malicious threats when the threatsā€™ behavior surpasses the Risk-Based Blocking threshold. The analytics engine automatically places a threat on the permanent Blacklist after it is blocked three times.

Once added to the Blacklist or Whitelist, the entity remains there permanently until it is manually removed. A user who has Write Access can manually remove an entity from the list, or you can request the ThreatX SOC to remove the entity.

Entity Details

The ThreatX platform analyzes HTTP traffic then extracts identifying metadata, including IP address, user agent, TLS fingerprint, and other characteristics to create a profile and identifier for each attacker, which is displayed in the Entity Details page. The data is presented with special emphasis on key attributes to further help identify trends and patterns.

The Entity Details page is accessible by clicking a threat on another page, such as the Dashboard.

entity details no bot 1024x670

Metrics

šŸ“ˆ Metrics - Entity Details
Risk Score
Threat name
Intensity

Represents the number of times rules were matched over the selected time range.

Current Status

The current action taken on the threat. You can change the action as needed. .

IP Address

If available, you can click the address to see any data about it in the ViewdnsInfo web site.

IP Reputation

Represents the legitimacy of the IP address with a score of 0 to 100. The higher the score, the more likely that the IP address is legitimate. A low score can indicate an attacker. A score of 0 could mean that the IP reputation is unknown. The scoring system is the opposite of Risk Score.

Location

Country of origin.

User agent

The program that sent the request on behalf of the user, such as a web browser or curl, as indicated in the User-Agent header field.

Any tags assigned to the threat

If your account has permission, you can add a tag to track similar threats.

Chart that displays the attacks over time

You can hover over various locations for details of the threat at that time.

Activity

ā„¹ļø Activity - Entity Details

Type

If there was an action taken on the request, the column shows the action which can be Watched, Blocked, Whitelisted, or Blacklisted. If there was no action taken, then the Type is Rule Match when the request matches a rule.

Risk

Risk Score.

Blocked

A red dot indicates that a request from the threat was blocked.

Profile

API Profile.

Domain

Also referred to as a site.

Path

Also referred to as an endpoint.

Method

API call used by the threat.

TLS fingerprint

Digital certificate fingerprint of the threat.

Parameters

URL query parameters of the request, if present.

Content-type

Also referred to as an API profile. Content types can be application/json,Ā application/xmlĀ orĀ text/xml.

Request ID

Random string generated by the ThreatX platform to help identify each request that passes through the ThreatX sensors.

Status

HTTP response code unless the threat is blocked.

Size

Length of the response in bytes.

Time (ms)

Time taken to receive the response from the upstream server.

Description

Lists the rules that were matched by the threat. You can click a rule to display the properties for that rule.

Count

Number of rules matched by the request.

Searching
  • You can click the search icon šŸ”Ž in each column header to filter the table.

  • The search icon šŸ”Ž for some rows will also display a count of each type of entry (e.g., the Domain row would show every type of domain and the number of each).

Active Threats

If a threat is active, you will see the following changes in the Activity table:

  • Additional events with Rule Match in the Type column.

  • Increasing Risk Score.

  • If your ThreatX platform has the auto-blocking feature enabled, the threat is blocked when it exceeds the auto-blocking threshold and you see a red dot in the Blocked column.

Blocking

Blocking is a temporary action and the block is released after a period of time. The Type column changes to Watched. If that entity is still active, you might see more entries with Rule Match. However, some attackers try a few requests, get blocked, give up and do not return.

Responsive Actions

The page lists each action taken against the threat.

Analyst Notes

The page lists any notes left by an analyst.

You can add a note to give additional data or observations, along with any recommendations or instructions.

Endpoint Statistics

The page lists the endpoints that were targeted by the threat. It contains two tables.

  • API endpoints table lists the endpoints and their API profile.

  • Non-API endpoints table lists the targeted endpoints of non-API sites and the number of rule matches. A non-API site is a site not served by an API server. Typically, a non-API site has web assets which are used for human interaction.

The non-API endpoints table might list API endpoints when the ThreatX profiling engine is actively determining if the site is an API or web service site.


Rule Details

The Rule Details page displays a ruleā€™s properties, its conditions, and the actions it takes when the conditions are matched.

rule details no bot

ā„¹ļø Rule Detail Properties
Description

Text that defines the behavior or purpose of the rule.

Tag Name

Brief text to identify the rule. The tag exists to identify a rule when a description is long.

Classification

Describes the type of attack which the rule assigns to a threat. The classification displays in various tables as the attack class.

State

Assigns the threatā€™s assumed objective when the request matched this rule.

Risk

Assigns the Risk Level to the attack.

Action

The action that the rule performs when responding to a threat. The action appears in the Status column in various tables.

Track

Begin or continue tracking a risk score for the offending entity, based on the risk assigned to this rule and other factors.

Block

Immediately block the request and track a risk score for the offending entity.

Tarpit

Limit the speed at which the offending entity receives responses and track a risk score for the entity.

Interrogate

Challenge an offending entity with a cookie and try to fingerprint the user-agent.

The Visual and JSON tabs display the programmatic rule conditions in a Visual or JSON format.

The Rule Details page is accessible from various tables by clicking a rule name in the Description column. It is also accessible for the navigation bar by opening Settings  Rules  <rule details page  .

Rule details are read-only unless your account has permission to edit rules.