Cyber-Attack View
This page shows the list of all the attacks that Check Point ThreatCloud prevented at your branch offices and remote users, and their detailed description:
-
Hosts infected with Bots
-
Malicious Files
-
Malicious Websites
-
Cyber-Attack Trends
Harmony Connect covers all network protocols.
Double-click a widget, graph or timeline to see sub-views with more granular data.
You can see a complete break-down of the connection and the malicious operations prevented on a granular traffic logs.
Double-click to see a log card displaying detailed analysis of every event.