ThreatX UI
Introduction
After connecting hostnames to ThreatX, real-time attack information will be displayed via the Attack Dashboard and API Defender in the ThreatX platform. Use the latest available sensor version to see all information populated on the ThreatX platform.
The ThreatX platform provides metrics and analytical data of API traffic and actions taken to the dashboards and reporting pages. The ThreatX User Interface is off-site and hosted by the ThreatX SOC.
Interfaces
The administrative settings can be accessed from the ThreatX user interface or API command line interface.
The ThreatX user interface presents the data the platform collects into various pages and tables. The ThreatX navigation bar has a Settings menu, under which you can access the pages discussed in this guide. You can log in to the ThreatX user interface at x.threatx.io/.
==
Appendix A: Glossary
The ThreatX platform provides information about sites, endpoints, traffic, and threats and uses various terms to describe them. For clarity, the terms used in the ThreatX platform are defined as follows.
- API profile
-
Type of API such as JSON, XML, and URL-encoded.
- API traffic
-
Traffic that includes HTTP messages containing programmatic content sent between the site and client applications.
- Endpoint
-
URL pattern representing a group of resources within a site. A site can have multiple endpoints.
- Entity
-
A specific IP address or IP group. A suspicious entity is a threat.
- iWAF
-
Intelligent web application firewall. The next generation of the Web Application Firewall. See WAF.
- Non-API site
-
Site not served by an API server. Typically, a non-API site has web assets which are used for human interaction.
- Rule
-
Set of Boolean conditions that, when True, implement the ruleâs defined action and risk level. A True state is also known as a match.
- Sensor
-
See WAF sensor.
- Site
-
Web property serving API responses intended for consumption by an application. Also called an API site.
- Tenant
-
Container for an organizational unit such as a department or company. The ThreatX platform supports multiple tenants.
- Threat
-
Representation of individual API clients or network of clients that have engaged in an activity that matches one or more rules and is therefore identified as suspicious or questionable. An identified threat is not necessarily malicious.
- WAF
-
Web Application Firewall. Type of application firewall that applies specifically to web applications. It is deployed in front of web applications and analyzes bi-directional web-based (HTTP) traffic and detects and blocks anything malicious.
- WAF Sensor
-
A reverse proxy-based web application firewall. Sensors monitor all the HTTP(S) traffic flows for malicious and legitimate activity. The sensor is decoupled from the analytics platform, so it can be run anywhere in the world and is used by customers with high bandwidth requirements.