Using this section, users are able to easily identify attacked images and hosts in their deployment as well as where legitimate traffic and attacks originate from.
Users can filter the results based on countries or image names, to obtain a comprehensive overview of attacked images - WAAS events, identified vulnerabilities, and runtime forensics.