Provides a summary of the endpoints with the
most suspicious threat detections. Example: name of the destination,
summary information about the source and rules/violations, the total
number of suspicious threats on the network
Suspicious Threat Riskiest Endpoints Summary Data View
Data
|
Description
|
Endpoint IP
|
Displays the IP addresses of computers affected
by suspicious threats.
|
Unique Policies/Rules
|
Displays the number of unique policies/rules
the source computer violates.
Example: A managed product detects
10 policy violation instances of the same policy on 2 computers.
Unique
Policies/Rules = 1
|
Unique Sources
|
Displays the number of unique sources where
suspicious threats originate.
Example: A managed product detects
10 suspicious threat instances of the same type originating from
3 computers.
Unique Sources = 3
|
Detections
|
Displays the total number of policy/rule violations
managed products detect.
Example: A managed product detects
10 violation instances of the same type on one computer.
Detections
= 10
|