Views:

Provides a summary of suspicious threat detections from a specific source. Example: name of the source, summary information about the destination and rules/violations, the total number of suspicious threats on the network

Table 1. Suspicious Source Summary Data View

Data

Description

Source IP

Displays the IP addresses of sources where suspicious threats originate.

Unique Policies/Rules

Displays the number of unique policies/rules the source computer violates.

Example: A managed product detects 10 policy violation instances of the same policy on 2 computers.

Unique Policies/Rules = 1

Unique Endpoints

Displays the number of unique computers affected by the suspicious threat.

Example: A managed product detects 10 suspicious threat instances of the same type on 2 computers.

Unique Endpoints = 2

Detections

Displays the total number of policy/rule violations managed products detect.

Example: A managed product detects 10 violation instances of the same type on one computer.

Detections = 10