Threat Type Details
The Threats Details provides information about specific threat types that your environment may have been exposed to. View the most active identities, identity types, destinations, and threats associated with this threat type.
Table of Contents
- Prerequisites
- View a Threat's Details
- View a Threat Type's Requests
- View the Threat Type's Impact on Your Environment
- View More Details in Activity Search
Prerequisites
- A minimum of Read-Only access.
View a Threat's Details
- Navigate to Monitor > Reports > Top Threats.

- Choose a threat type and click the name to view further details.
- View the threat type description.
- Select a time frame to view the results of the report.
View a Threat Type's Requests
The first graph on the details page depicts the requests for the threat type within the selected time period. A detailed description of the threat type provides insight as to what type of exposure the requests pose to your environment. A request is any time an identity makes a request to access a destination, and a threat is when this request is deemed malicious.

- Navigate to Reporting > Core Reports > Top Threats.
- Choose a threat type and click the name to view details.
- Choose to view all requests, only Blocked requests, or only Allowed requests. By default, both allowed and blocked are shown. Click either name to hide those requests in the graph.
- Hover on a point in the graph to reveal the date and time and the number of Blocked and Allowed requests at that point.

View the Threat Type's Impact on Your Environment
- Navigate to Reporting > Core Reports > Top Threats.
- Choose a threat type and click the name to view further details.
- View the most active identity types.
The most active identity types lists the types of identities most actively making requests and whether those requests were blocked or allowed.

- View the threats associated with this threat type and the number of threats blocked.
- View the most active identities associated with this threat type and how many requests were allowed or blocked.
- View the most active destinations where this threat type has been most associated during requests. The list provides the total number of requests during the given time period for each destination and how many were blocked or allowed.
View More Details in Activity Search
Click an individual identity type, identity name, destination.
Top Threats Report < Threat Type Details > Threat Type Definitions
Updated 7 months ago