Detection > Risk Object
On the risk object page, you can:
To configure a detected object, on the risk object page, click Risk Object Configuration and configure the related options on the Risk Object Configuration dialog. Descriptions of the options on the dialog are listed in the table below:
Option | Description |
Search Conditions | |
Name |
Search by the object name. |
Type |
Search by the object type. |
Virtual Router |
Search by the virtual router name. |
IP |
Search by the IP address. |
Search |
Click to search by the specified conditions. The search result will be shown in the table below. |
Reset |
Click the clear all the search conditions. |
New: Click this button, the Risk Object Configuration dialog appears. Configure the detected object on the dialog. The descriptions of the options are: | |
Basic |
Options on the Basic tab:
The service and network nodes added in the monitor module are detected here automatically. |
Advanced |
Options on the Advanced tab are:
|
Edit: Select the detected object you want to edit from the detect object table, and then click this button to edit. The service and network nodes added in the monitor module cannot be edited here. | |
Delete: Select the detected objects you want to delete from the detected object table, and then click this button to delete. | |
Detected Object Table | |
Name |
Shows the name of the detected object. |
Type |
Shows the type of the detected object. |
Virtual Router |
Shows the virtual router the detected object belongs to. |
IP |
Shows the IP address of the detected object. |
Protocol - Port |
Shows the protocol type and the port number. |
Defined Type |
Shows the defined type of the detected object, it can be created in the risk obejct module (marked as "User-defined") or created in the monitor module (marked as "Service/Network Node"). |
Application |
Shows the application information of the detected object. |
Schedule |
Shows the schedule bound to the detected object. |
Description |
Shows the description of the detected object. |
Operation |
Click Set Threshold to set the high and low threshold for the detected object. |
The detected object table on the risk object page shows the anomalies and the health status of the detected objects and provides the links to the detailed page and the methods to resolve the abnormalities. For more information, see the table below.
Option | Description |
Risk Object |
Shows the name of the detected object. |
Type |
Shows the type of the detected object. |
Anomaly Alert Frequency |
Shows the abnormal statistics of detected object. |
Score |
Shows the health score of the detected object. The system evaluates the threat status (host/server) and abnormality status of the detected object, and then calculates the health score based on the evaluating result. The score represents the latest 24 hours' health status of the detected object. |
Health Status |
The system uses star in different colors to show the health status of the detected object:
Click View Alerts to see the detailed abnormal statistics of the detected object. Click Configure Settings, the Configure Settings dialog appears. You can do the following tasks on this dialog:
|