About the Threat Analytics Dashboard
Threat Analytics lets you investigate specific characteristics of malvertising attacks on your site or application. This is useful for tracking common trends or identifying patterns between attackers so you can further protect your organization appropriately. You can learn about the available data in Threat Analytics with this article.
Dashboard filters
You can use the filters to narrow down results in your dashboard. The available filters are:
- Date Range: The time period you want to display results for. Click a date to select your desired time range.
- Smart Filter: Click Choose to add granular filters to your data. Then, click Filter to apply them. You can go back to default by clicking Reset.
Threat activity over time
The Threat activity over time graph shows you different threat characteristics over the time period. This helps you learn when certain types of threats or attackers were active during what dates. You can click each tab to toggle the graph view. The available views are:
- Threat class: View attacks over time by the threat class.
- Threat type: View attacks over time by their threat type.
- Delivery source: View attacks by how they were sourced to your site or application.
- SSP: View attacks by the SSP that delivered the ad.
- DSP: View attacks by the DSP that delivered the ad.
- Device type: View attacks by device type.
- Operating system: View attacks by operating system.
- Country: View attacks by their country of origin.
You can also click each characteristic in the legend to the right of the graph to toggle it from view.
Attacks by Site
The Attacks by Site graph shows the distribution of all your attacks across your selected sites or applications. This is useful for tracking which of your sites were targeted and how often.
Threat activity distributions
Threat activity distributions show the total distribution of threat characteristics. The available characteristics are the same as in Threat activity over time. However, instead of showing the trend over time, these visualizations show the distribution of characteristics totaled across the full time period.
Overview of Threat Violations
The Overview of Threat Violations table lists each attack that matches your filters. HUMAN groups these attacks wherever possible by common characteristics:
- SSP: The SSP that delivered the ad with the violation.
- Delivery source: The delivery source of the violation.
- Block reason: The reason HUMAN blocked the attack.
- Block trigger: What triggered HUMAN to block the attack.
- Total violations: The total number of violations blocked for attacks with these common characteristics.
You can click on each of these column headings to sort by that heading. You can also download a CSV file for up to the first 20,000 rows of data. Depending on the amount of data, it may take a few minutes to complete your download.