ThreatX UI
The ThreatX user interface is a Software-as-a-Service (SaaS) application that presents the data the platform collects into various pages and tables. The ThreatX navigation bar has a Settings menu, from which you can accomplish various administative tasks.
After connecting hostnames to ThreatX, real-time attack information will be displayed via the Attack Dashboard and API Defender in the ThreatX platform.
Use the latest available sensor version to see all information populated on the ThreatX platform. |
Dashboard
-
Monitor changes.
-
Review details about a specific threat.
-
Determine if traffic from an origin is to be allowed or blocked.
-
Identify unexpected usage patterns.
Glossary
- API profile
-
Type of API such as JSON, XML, and URL-encoded.
- API traffic
-
Traffic that includes HTTP messages containing programmatic content sent between the site and client applications.
- Endpoint
-
URL pattern representing a group of resources within a site. A site can have multiple endpoints.
- Entity
-
A specific IP address or IP group. A suspicious entity is a threat.
- iWAF
-
Intelligent web application firewall. The next generation of the Web Application Firewall. See WAF.
- Non-API site
-
Site not served by an API server. Typically, a non-API site has web assets which are used for human interaction.
- Rule
-
Set of Boolean conditions that, when True, implement the rule’s defined action and risk level. A True state is also known as a match.
- Sensor
-
See WAF sensor.
- Site
-
Web property serving API responses intended for consumption by an application. Also called an API site.
- Tenant
-
Container for an organizational unit such as a department or company. The ThreatX platform supports multiple tenants.
- Threat
-
Representation of individual API clients or network of clients that have engaged in an activity that matches one or more rules and is therefore identified as suspicious or questionable. An identified threat is not necessarily malicious.
- WAF
-
Web Application Firewall. Type of application firewall that applies specifically to web applications. It is deployed in front of web applications and analyzes bi-directional web-based (HTTP) traffic and detects and blocks anything malicious.
- WAF Sensor
-
A reverse proxy-based web application firewall. Sensors monitor all the HTTP(S) traffic flows for malicious and legitimate activity. The sensor is decoupled from the analytics platform, so it can be run anywhere in the world and is used by customers with high bandwidth requirements.