Views:

Get a quick overview of the progress of ongoing targeted attacks and affected endpoints.

This section displays information about attacker activity for four phases that precede command-and-control communication. Find out if attackers are attempting to gain or maintain their foothold on your network, or if data exfiltration or some form of system impact may soon occur.
Click on the desktop or server icons on each phase to view endpoints affected during the attack phase.
Attack Phase
Description
Initial Access
An attacker has gained access or is attempting to gain access to your environment. If successful, attackers may attempt to move to the next attack phase.
Persistence
An attacker is attempting to maintain or increase access to your environment. If successful, attackers may attempt to load malcious payloads onto your environment, such as bots and malware, which may remain dormant in your environment even if the attacker stops.
Credential Access
An attacker has obtained or is attempting to obtain account credentials within your environment. Data exfiltration or some form of system impact may occur soon. Attackers may attempt to interrupt, manipulate, steal, or destroy critical assets.
Lateral Movement
An attacker is expanding or attempting to expand the attack scope within your environment. Data exfiltration or some form of system impact may soon occur. Attackers may interrupt, manipulate, steal, or destroy your critical assets.
Impact
A targeted attack of high severity which reaches the final attack phase may cause significant damage within your environment. This section estimates the overall impact of the ongoing campaign according to attack indicators and affected endpoints.