Activity Dashboard: WildFire (Beta)

The WildFire dashboard in Activity shows you how WildFire is protecting you from net new malware that’s concealed in files, executables, and email links.
The WildFire dashboard in Activity shows you how WildFire is protecting you from net new malware that’s concealed in files, executables, and email links.
Go to
Activity
Dashboards
WildFire
to get started; here are some examples of the data this dashboard provides:
WildFire Session Trends
  • Go to WildFire > Summary
    Examine trends for the net new samples that WildFire detected on your network. Toggle between the WildFire verdicts for unknown samples and policy actions taken on samples.
Interesting Insights
  • Go to WildFire > Summary
    WildFire found these samples first in your network or they’re unique to your network.
Verdict Distribution
  • Go to WildFire > Summary
    Learn more about the verdicts for net new samples that WildFire detected for the first time in your network. Focus in on the sample types that are most frequently concealing malware.
Tags
  • Go to WildFire > Summary
    Tags show you when an individual sample is part of a larger threat—like a malware family or a threat campaign—or is a trademark of a malicious actor. Tags can help you gain a larger context surrounding malicious activity.
    See the threat families, campaigns, or actors that are most actively targeting your network.
Samples
  • Go to WildFire > Samples
    Review a record of all the unknown samples that WildFire detected in your network and sent for WildFire analysis. You can view samples details and also jump to the log viewer, to see all the log activity related to the sample.
Applications
  • Go to WildFire > Summary
    Review the details of the applications that delivered the most malicious samples in your network. Click the malicious samples count to know more about the samples.
Users
  • Go to WildFire > Summary
    This shows the user accounts that are most frequently used to deliver malicious samples in your network. Click the user name to investigate the user activity patterns in the User Activity dashboard.
Regions
  • Go to WildFire > Summary
    View the sample details for the locations that sent or received the most malicious samples in your network. You can view the sample count for source and destination regions in a map or table format.
Firewalls
AIOps for NGFW
  • Go to WildFire > Summary
    You can view the firewalls that are contributing to the most malicious samples in your network.
Share, Download, and Schedule Reports for a Dashboard
For all dashboards, you can download or share covering the data a dashboard displays. Find these icons in the top right of the dashboard:

Recommended For You