magnifying-glassEvent and Threat Monitoring

This section provides the granularity required for forensic analysis and incident investigation

Events Table: Detailed listing of each security incident. Columns include: Event ID, Threat Type, Severity (Critical, High, Medium), Device IP, Device Model, OS Version and Timestamp. Allows advanced sorting and filtering. • Event Details: By clicking an item in the table, a deep view opens containing: • Technical Description: Explanation of what the threat means (e.g., "Jailbreak Detection: Unrestricted root access detected..."). • Forensic Data: Verification function that triggered the alert, Kernel version, precise location and time zone. • Metadata: unique event ID and Device Score at the time of the incident.

Last updated