ThreatX Dashboard
Introduction
The Dashboard, available from the navigation bar, displays essential data collected for each site in your environment under ThreatX protection. The data is live and driven by active site traffic.
Attack Dashboard
Threat Entities
The ThreatX Attack Dashboard visualizes both malicious and benign traffic over time and allows ThreatX users to drill down and investigate attacking entities, and the responsive actions the ThreatX Platform took to protect their APIs and web applications. The Attack Dashboard is comprised of three main views: Threat Entities, Top Targets, and Threat Map. Each view provides a different perspective on an organizationās attack surface.
Top Targets
The Attack Dashboard Top Targets view highlights the most frequently targeted sites and endpoints within a tenant. This view is critical for large enterprises with dozens or hundreds of sites protected by the ThreatX Platform. This view puts the most frequently and aggressively targeted sites front and center, allowing administrators to understand their risk profile, and the protection theyāre receiving from ThreatX.
Threat Map
The Threat Map view, in the Attack Dashboard, provides visibility into the location of each unique entity and its associated risk. The interactive map allows the user to identify how many unique attackers are acting from each country.
API Observability
The API Defender dashboard provides visibility into endpoints discovered and protected by the ThreatX platform. API traffic analytics, error code summaries, and visualizations of API schema conformance are displayed in API Defender, as shown below in Figure 4, providing the ability to compare what API traffic is expected vs. an anomaly against your organizationās API specifications. The API Defender dashboard brings together API discovery, observability, and the context needed to understand your organizationās entire attack surface against what is being seen in the wild.
API Discovery
ThreatXās API discovery capabilities analyze and profile legitimate, suspicious, and malicious API use to discover and enumerate the endpoints as well as the traffic they serve. While monitoring API interactions in real-time, ThreatX can accurately detect real API endpoints and determine identifying attributes of their tech stacks or markup encodings.
Schema Compliance
Schema Compliance gives users the ability to upload, manage, and cross-compare which API traffic is expected according to your organizationās schema vs. what is being seen in the wild. Manage your organizationās API schemas within the API Defender page to gain risk visibility, simplify schema enforcement, or create API-centered protection rules.
By default, the ThreatX platform updates the data every few seconds. You can choose to display historical data by selecting a time frame, as described in Data Controls and Filters. |
The Dashboard includes graphs and three tables, which are described in the following sections. Each table is a different perspective of the organizationās attack surface. For detailed information about the data in the table, see Managing Threats.
Graphs
The Dashboard includes three interactive graphs.
You can hover over a point on any graph to display the metrics at that time.
Threat Entities
The Threat Entities table offers the visibility security teams need to quickly evaluate threats prioritized by the Risk Score and Intensity, which represents the number of times rules were matched over the selected time range.
You can drill into the threat to view specific metadata of that threat, as described in Entity Details.
If you are unfamiliar with the Status icons, you can hover over the icon to see its definition.
Threat Map
Threat Map offers visibility into the location of each unique threat and its associated risk. The interactive map allows the user to identify how many unique attackers are acting from each country. You can hover over a country on the map, and a pop-up displays the number of attacking threats originating in that country.
Data controls and filters
The ThreatX dashboard pages offer the following controls and filters that you can use to focus on specific data.
Some data in the various tables include a percentage with an arrow. The value indicates a change in the data relative to the baseline reporting period, which is 7 days before the selected time range.
For example, when you select a 12-hour time range, the baseline period is the same 12-hour period from 7 days previous. The arrow indicates an increase or decrease in value. The following figure shows an increase in the number of Match Events of 30%.
Allow, deny, and block lists
You can use the following lists to always deny, temporarily block, or always allow specific entities. An entity is a specific IP address or IP group. A suspicious entity is a threat.
You can add an entity as an IP address or CIDR to any of the lists manually, as described in Managing Threats. You should exercise caution when manually adding a threat to the Blacklist or Whitelist to prevent a problem with legitimate traffic or always allowing malicious traffic.
If the ThreatX Risk-Based Blocking feature is enabled, the ThreatX platform can add a threat automatically to the Blacklist or Blocklist based on the threatās behavior. The ThreatX behavioral analytics engine, hackerMindā¢, blocks persistently malicious threats when the threatsā behavior surpasses the Risk-Based Blocking threshold. The analytics engine automatically places a threat on the permanent Blacklist after it is blocked three times.
Once added to the Blacklist or Whitelist, the entity remains there permanently until it is manually removed. A user who has Write Access can manually remove an entity from the list, or you can request the ThreatX SOC to remove the entity.
Entity Details
The ThreatX platform analyzes HTTP traffic then extracts identifying metadata, including IP address, user agent, TLS fingerprint, and other characteristics to create a profile and identifier for each attacker, which is displayed in the Entity Details page. The data is presented with special emphasis on key attributes to further help identify trends and patterns.
The Entity Details page is accessible by clicking a threat on another page, such as the Dashboard.
Activity
Searching
|
Active Threats
If a threat is active, you will see the following changes in the Activity table:
-
Additional events with Rule Match in the Type column.
-
Increasing Risk Score.
-
If your ThreatX platform has the auto-blocking feature enabled, the threat is blocked when it exceeds the auto-blocking threshold and you see a red dot in the Blocked column.
Blocking
Blocking is a temporary action and the block is released after a period of time. The Type column changes to Watched. If that entity is still active, you might see more entries with Rule Match. However, some attackers try a few requests, get blocked, give up and do not return.
Responsive Actions
The page lists each action taken against the threat.
Analyst Notes
The page lists any notes left by an analyst.
You can add a note to give additional data or observations, along with any recommendations or instructions.
Endpoint Statistics
The page lists the endpoints that were targeted by the threat. It contains two tables.
-
API endpoints table lists the endpoints and their API profile.
-
Non-API endpoints table lists the targeted endpoints of non-API sites and the number of rule matches. A non-API site is a site not served by an API server. Typically, a non-API site has web assets which are used for human interaction.
The non-API endpoints table might list API endpoints when the ThreatX profiling engine is actively determining if the site is an API or web service site.
Rule Details
The Rule Details page displays a ruleās properties, its conditions, and the actions it takes when the conditions are matched.
The Visual and JSON tabs display the programmatic rule conditions in a Visual or JSON format.
The Rule Details page is accessible from various tables by clicking a rule name in the Description column. It is also accessible for the navigation bar by opening
.Rule details are read-only unless your account has permission to edit rules. |