Investigate
The Investigate tab provides a comprehensive interface for monitoring and managing security threats discovered in real-time by Cloud Detection and Response across your infrastructure. This dashboard enables security analysts and IT professionals to track, analyze, and respond to security findings in real-time from a single source of view.
Summary Cards
The dashboard header contains four key metric cards:
- SEVERITY
- Displays severity distribution of security findings
- Provides quick visibility into critical issues
- ACCOUNTS/SUBSCRIPTIONS/PROJECTS
- Shows security findings across different organizational units
- Helps identify affected resources
- LAST 7 DAYS THREATS
- Presents a weekly overview of security threats
- Enables trend analysis and pattern recognition
- TOP 10 ASSETS WITH THREATS
- Lists the most vulnerable or targeted assets
- Helps prioritize security responses
Data List
On the main data list screen, you can find multiple columns that presents security findings collected from CDR.
The available columns are
DETECTED ON - Displays the exact date and time of when the threat was detected.
TITLE - A descriptive name of the security finding.
SEVERITY - The severity associated with the threat.
CLASS : CATEGORY - Describes the nature of the threat. Whether it is an API activity or a Cryptojacking etc.
AFFECTED RESOURCE - Describes the assets affected by this findings.
CLOUD IDENTIFIER - Describes which cloud provider is affected by this finding.