Hosts that Accessed Malicious Sites (Attacks Allowed By Policy)

Description

In the main Cyber Attack View, in the Attacks Allowed By Policy section, double-click Hosts that Accessed Malicious Sites.

The drill-down view summarizes access attempts to malicious sites from the internal network.

Drill-Down View

This is an obfuscated example of the drill-down view:

To see the applicable logs (the next drill-down level), double-click on a value.

Available Widgets

Widgets available in the drill-down view:

Widget

Type

Description

Hosts that Accessed Malicious Sites

Infographic

Shows the number of internal hosts that accessed malicious websites.

Top 10 Protection Types

Chart

Shows the number of events reported by web attack protections for the detected malware families (based on Check Point ThreatWiki and Check Point Research).

Different colors show different malware families.

Top 15 Hosts

Chart

Shows the internal hosts that accessed malicious websites.

The chart is ordered by the number of connections from each host.

Shows:

  • The source IP addresses of internal hosts that accessed malicious websites.

  • The detected malware families (based on Check Point ThreatWiki and Check Point Research).

  • The number of logged connections from each host.

Different colors show different malware families.

Top Malicious Sites

Table

Shows the information about malicious websites.

Shows:

  • The source IP addresses of internal hosts.

  • The number of logged connections from each host.

  • URLs of malicious sites.

  • Destination ports of malicious sites.

Timeline Showing Access to Malicious Sites

Timeline

Shows the detected malware families and their timeline.

The timeline is divided into protection types.

Different colors show different malware families.

Widget Query

In addition to the Default Query, the widget runs this query:

Custom Filter = ((blade:IPS AND ("Adobe Flash Protection Violation" OR "Adobe Shockwave Protection Violation" OR "Web Client Enforcement Violation" OR "Exploit Kit")) OR (blade:Anti-Virus AND ("URL Reputation" OR "DNS Reputation")))

Calculated Service > Not equals > smtp

Best Practices

Best practices against malicious sites: