Dashboard Terminology
Last updated
Last updated
Bandwidth Consumption:
This indicates the total amount of data transferred through the Prophaze appliance during the reporting period. (incoming and outgoing).
Upload bandwidth represents the data uploaded from your network to the internet.
Prophaze has features to manage large file uploads, such as:
Throttling upload speeds to prevent overwhelming bandwidth.
Setting size limits for uploads to prevent abuse.
Integrating with Cloud storage solutions for efficient handling of large files.
Geo Attack Distribution:
The map shows the geographical distribution of IP addresses associated with the blocked/detected attacks. This can help identify potential sources of threats.
Attack Types:
These codes represent specific attack categories identified by Prophaze.
A03:2021-Injection indicates attempts to inject malicious code into your system.
A04:2021-Insecure Design points to vulnerabilities in website or application design that attackers try to exploit.
Top 10 Attack IP Addresses:
If in active mode it will automatically be blocked and if in learning mode it will only be detected (Prophaze will do these parts.)
You can consider blocking these specific IPs at your network firewall if the attacks are persistent and originate from the same sources.
Top 10 Attack Originating Countries:
No, it only indicates that attacks originated from IP addresses located in those countries. Legitimate traffic can also come from these regions. Which won't be blocked.
We can block the traffic coming from a particular country.
Top 10 User IP addresses:
This list shows the top 10 IP addresses that generated the most traffic during the reporting period.
Most Used HTTP Methods:
These are standard methods used in HTTP communication between web browsers and servers.
GET is used to retrieve information from a server.
POST is used to send data to a server.
IP Address Information:
The table shows:
Date and Time of the attack attempt
IP Address of the attacker
Country associated with the IP address
Two options: "Permanently Block IP address" and "Allow IP address"
"Explore" button leads to more details about the specific attack.
Taking Action:
This option instructs the security solution to block all future traffic attempts from that specific IP address.
Choosing this option would allow traffic from that specific IP address despite the potential attack attempt.
The security solution analyzes traffic patterns and compares them against known attack signatures or threat intelligence to identify suspicious activity.
False positives: Security systems can sometimes misidentify legitimate traffic as attacks. Investigate before blocking to avoid impacting authorized users.
IP reputation: Check if the IP is known to be malicious using online tools or threat intelligence feeds.
Impact on legitimate users: Blocking a shared IP address might affect other users behind that IP. Consider alternative mitigation strategies if necessary.
Rate limiting: Restrict the number of requests an IP address can send within a specific timeframe.
Challenge-response mechanisms: Implement CAPTCHAs or other challenges to differentiate between bots and human users.
Security rules customization: Create custom rules based on specific threat intelligence to target attack patterns.
SQL injection is a cyberattack technique where malicious code is injected into website forms or database queries. This code can then be used to steal sensitive data, modify information, or disrupt website functionality.
Yes, we get information like the below given example:
/wp-content/plugins/about.php - This suggests the attacker might have targeted a specific plugin on a WordPress website.
Yes, depending upon the attacks they are categorized as high and low.
High - This indicates a potentially serious attack that could have compromised the website or user data.
Request Details:
This section shows details about the attacker's browser, encoding preferences, and connection type.
Yes, we get all the information about different kinds of attacks like:
An SQL injection attempt. This means the attacker tried to inject malicious code into a web page to potentially steal data or gain unauthorized access to the system