icon-unified.svg
Experience Center

Viewing the Advanced Threats Dashboard

The Advanced Threats dashboard provides an overview of cybersecurity threats in your organization.

Filtering

  • Time Range: Use the Time Range filter in the upper right to choose a specific time range between 1 Day and 90 Days in which to view data. The selected period applies to all data within the dashboard. The default time range is 14 Days.
  • Threat Category: Select the categories of threat you want to include or exclude:
      • Malware
      • Spyware
      • Virus
      • Sandbox Adware
      • Sandbox Anonymizer
      • Sandbox Malware
      • Sandbox Offensive Security Tools
      • Sandbox Ransomware
      • Suspected Spyware or Adware
      • Adware/Spyware Sites
      • Advanced Security
      • Botnet Callback
      • Browser Exploit
      • Crypto Mining
      • Domain Generated Algorithm Domains
      • Malicious Content
      • Suspicious Content
      • Peer-to-Peer
      • Phishing
      • Suspicious Destinations
      • Unauthorized Communication
      • Webspam
      • Cross-site Scripting
      • Unknown (this represents all the incidents that the Zscaler service was unable to classify under a threat category or were not classifiable under any of the preceding categories)
      Close

Dashboard Widgets

  • This line graph shows the number of incidents recorded for the selected time period. Hover over a date in the graph to see the total number of incidents for that date and the breakdown among the threat categories.

    Close
  • This table provides a detailed list of threat incidents for the specified time range and type.

    • Name: The name of the threat incident.
    • Category: The threat category (e.g. Spyware, Phishing, etc.)
    • Impacted Systems: The number of systems affected by the incident.
    • Status: The action taken on the threat, e.g. Allowed or Blocked.
    • Last Known Date: The date and time of the last known attempt by the threat.
    • First Known Date: The date and time of the first known attempt by the threat.

    Click any row in the table to see additional detail on that advanced threat incident on two tabs:

    • The Details tab has information about the threat:
      • Policy Action: The policy action enforced on transactions related to the incident.
      • Event Type: The type of threat event.
      • Last Known Attempt: The date and time of the last known attempt by the threat.
      • First Known Attempt: The date and time of the first known attempt by the threat.
      • Duration: The duration between the first and last known attempt by the threat.
      • Total Transactions: The total number of transactions related to the threat.
      • Total Bytes: The total bytes of data for all the transactions related to the threat.
      • File Name: The name of the file related to the incident.
      • Sandbox Category: The name of the sandbox category, if the file is sent for sandbox analysis.
      • File Type: The type of file involved in the incident.
      • File Size: The file size involved in the incident.
      • MD5: The MD5 hash for the file that triggered the rule.
      • SHA-2 (256-bit): The hash of identical files.
      • Destination IP: The destination IP.
      • Hostname: The hostname involved in the incident.
      • Application Category: The application category related to the incident, if applicable.
      • Application: The name of the application involved in the incident, if applicable.
      • URL Category: The URL category of the incident.
    • The Impacted Systems tab has information about the systems and users affected by the threat:
      • User Name: The name of the user.
      • Client IP: The IP address from which the transaction originated. This is the IP address of the client device.
      • Client External IP: The internet gateway location IP address of the client.
      • Last Known Attempt: The date and time of the last known attempt by the threat for the user.
      • First Known Attempt: The date and time of the first known attempt by the threat for the user.
    Close
Related Articles
Viewing the Cybersecurity DashboardViewing the Transactional Activity DashboardViewing the Advanced Threats DashboardViewing the Sandbox Threats DashboardViewing the Threat Locations DashboardViewing the SSL Inspection Dashboard