The WildFire dashboard in Activity shows you how WildFire
is protecting you from net new malware that’s concealed in files,
executables, and email links.
The WildFire dashboard in Activity shows you how
WildFire is protecting you from net new malware that’s concealed
in files, executables, and email links.
Go to
Activity
Dashboards
WildFire
to
get started; here are some examples of the data this dashboard provides:
WildFire Session Trends
Go to WildFire > Summary
Examine
trends for the net new samples that WildFire detected on your network. Toggle
between the WildFire verdicts for unknown samples and policy actions
taken on samples.
Interesting Insights
Go to WildFire > Summary
WildFire found these samples
first in your network or they’re unique to your network.
Verdict Distribution
Go to WildFire > Summary
Learn more about the verdicts
for net new samples that WildFire detected for the first time in
your network. Focus in on the sample types that are most frequently
concealing malware.
Tags
Go
to WildFire > Summary
Tags show you when an individual
sample is part of a larger threat—like a malware family or a threat
campaign—or is a trademark of a malicious actor. Tags can help you
gain a larger context surrounding malicious activity.
See
the threat families, campaigns, or actors that are most actively
targeting your network.
Samples
Go
to WildFire > Samples
Review a record of all the unknown
samples that WildFire detected in your network and sent for WildFire
analysis. You can view samples details and also jump to the log
viewer, to see all the log activity related to the sample.
Applications
Go
to WildFire > Summary
Review the details of the applications
that delivered the most malicious samples in your network. Click
the malicious samples count to know more about the samples.
Users
Go
to WildFire > Summary
This shows the user accounts that
are most frequently used to deliver malicious samples in your network.
Click the user name to investigate the user activity patterns in
the User Activity dashboard.
Regions
Go
to WildFire > Summary
View the sample details for the
locations that sent or received the most malicious samples in your
network. You can view the sample count for source and destination
regions in a map or table format.
Firewalls
AIOps for NGFW
Go to WildFire
> Summary
You can view the firewalls that are contributing
to the most malicious samples in your network.
Share, Download, and Schedule Reports for
a Dashboard
For all dashboards, you can download or share covering
the data a dashboard displays. Find these icons in the top right
of the dashboard: