Activity Explorer

Activity Explorer is a tool to search for and see events of interest in your environment's network traffic or event activities. It gathers and presents information from logs for the environments, enriched with information from more sources such as Threat Intelligence feeds, IP reputation databases, and geolocation databases.

Benefits

  • Quickly identify unwanted network traffic from unknown or suspicious sources

  • Identify gaps in cloud security settings or misconfigurations

  • Monitor and analyze user activity on your cloud environments for unusual behavior

Activity Explorer Views

Intelligence combines cloud assets and configuration information with real-time monitoring data from a variety of cloud platform sources and current threat intelligence feeds, IP reputation, and geolocation databases. This results in enhanced visualization that highlights suspicious traffic from legitimate traffic. For example, sources of network traffic from other cloud elements are shown based on type, and malicious external sources are marked as such.

The Activity Explorer provides visualization of event activities in your environment. You can view activities on all of your assets or filter the view for specific assets or activities. You can use this to identify anomalous activities from unwanted and potentially malicious sources or unexpected activities from trusted sources.

Actions

Filter Views

More Links