Alert Aktif
0
Silakan login untuk membuka dashboard monitoring keamanan.
| Endpoint | Status | Terakhir Terlihat |
|---|
Belum ada data agen.
Panduan langkah demi langkah penggunaan platform.
Alur sederhana: 1) pantau alert 2) klik Otomatis 3) eskalasi jika belum selesai.
| ID | Created | SLA | Host | Src IP | Sev | Rule | Status | Assignee | Summary | Action |
|---|
No queue data.
| Analyst | Open | Ack | Total Active |
|---|
No incident board data yet.
| Owner | Open | Ack | SLA Breach | Avg Age |
|---|
| Alert ID | Owner | Sev | SLA | Host | Summary | Action |
|---|
| Owner | Open | Ack | SLA Breach | Critical |
|---|
| Type | ID | Owner | Priority | Detail |
|---|
Belum ada data agen.
| Endpoint | Status | Terakhir Terlihat |
|---|
No host selected.
| Event Time | Type | Sev | Message |
|---|
| Alert ID | Status | Sev | Summary |
|---|
| Case ID | Status | Owner | Title |
|---|
| ID | Created | By | Expires | Uses | Revoked | Note | Action |
|---|
Belum ada token. Buat token enroll dulu.
No playbook run data yet.
| ID | Time | Action | Alert | Actor | Status | Detail |
|---|
| ID | Host | Type | Pri | Try | Timeout | Status | Requested | Completed | Summary |
|---|
| ID | Code | Name | Type | Min Sev | Enabled | Action |
|---|
| ID | Code | Name | Pair | Threshold | Window | Sev | Enabled | Action |
|---|
| ID | User | Role | Active | Last Login | Action |
|---|
No audit data loaded.
| ID | Time | Actor | Action | Detail |
|---|

| Time | User | Action | Detail |
|---|
| Timestamp | Event ID | Host | Src IP | Type | Sev | Message |
|---|
| ID | Name | Freq | Enabled | Next Run | Action |
|---|
No report run data yet.
| ID | Schedule | Started | Status | By | Summary |
|---|
| Metrik | Nilai | Informasi |
|---|
Belum ada data ringkasan TI.
| Tipe | Indikator | Match | Host | First Seen | Last Seen | Sumber | Contoh Host |
|---|
| ID | Name | Type | Interval | Enabled | Last Sync | Action |
|---|
| ID | Type | Value | Sev | Conf | Source | Enabled |
|---|
| ID | Time | Host | Type | IOC | Sev | Alert |
|---|
Monitor and analyze compromised credentials from external breach sources.
| Title | Domain | Compromised | Breach Date | Data Types | Source |
|---|
| ID | Title | Status | Owner | Alerts | Updated | Action |
|---|