{"_id":"55e4c823e252ac0d00303a54","githubsync":"","category":{"_id":"55e4c701177b6e0d003330fa","pages":["55e4c718177b6e0d003330fb","55e4c7ea40cda60d003bad38","55e4c823e252ac0d00303a54","55e4c9333325e60d007fbeb8","55e4c97540cda60d003bad3e","55e4c9903325e60d007fbebc","55e4c9c33325e60d007fbebe","55e4c9ce40cda60d003bad41"],"project":"55db8f8f1a91690d007ad975","version":"55db8f901a91690d007ad978","__v":8,"sync":{"url":"","isSync":false},"reference":false,"createdAt":"2015-08-31T21:28:33.497Z","from_sync":false,"order":2,"slug":"dashboard","title":"Dashboard"},"parentDoc":null,"project":"55db8f8f1a91690d007ad975","__v":10,"version":{"_id":"55db8f901a91690d007ad978","project":"55db8f8f1a91690d007ad975","__v":17,"createdAt":"2015-08-24T21:41:36.034Z","releaseDate":"2015-08-24T21:41:36.034Z","categories":["55db8f901a91690d007ad979","55db9856b3d6540d00886426","55dc751b00a8811900c230e3","55dc766255be9f21004ee250","55dc769200a8811900c230ed","55e4c701177b6e0d003330fa","55f4915caf0bc71900a53130","55f491b2be9c2b2100f0635d","560b22739c7be70d00100bd8","57488c53e8c6a420000b729c","574cefd95953e20e00f40f9f","5798edfd7700d30e00ad250c","579ac88234b5fd0e00b9e140","57c81c6d690c200e0047b72e","57d9b8fbda17c30e003897f1","57d9b90e608ea00e00f358d8","57d9b91cda17c30e003897f4"],"is_deprecated":false,"is_hidden":false,"is_beta":false,"is_stable":true,"codename":"","version_clean":"1.0.0","version":"1.0"},"user":"55dc702d7fa0290d00559106","updates":["562a83b0d56bc30d00f0ca78"],"next":{"pages":[],"description":""},"createdAt":"2015-08-31T21:33:23.085Z","link_external":false,"link_url":"","sync_unique":"","hidden":false,"api":{"results":{"codes":[]},"settings":"","auth":"required","params":[],"url":""},"isReference":false,"order":3,"body":"[block:callout]\n{\n  \"type\": \"info\",\n  \"body\": \"Keep in mind that this menu and all the options are also available per app. Just click on your app name to expand the list, and see the same time frame for all your applications.\"\n}\n[/block]\nTop portion of the Attacks view displays a graph of all attacks over the timeframe selected in the Date Range selector above.\n[block:image]\n{\n  \"images\": [\n    {\n      \"image\": [\n        \"https://files.readme.io/b31392b-Attacks.png\",\n        \"Attacks.png\",\n        1421,\n        462,\n        \"#f3f4f4\"\n      ]\n    }\n  ]\n}\n[/block]\nBelow this graph is a table of attacks plotted above, as well as detailed information including Start Time, Duration of the attack, Attacker IP or username, Threats reported and their Counts.\n[block:image]\n{\n  \"images\": [\n    {\n      \"image\": [\n        \"https://files.readme.io/gJiSPMSTTUBvfn4XYRXX_2015-08-31_1705.png\",\n        \"2015-08-31_1705.png\",\n        \"1151\",\n        \"503\",\n        \"#8fa6b8\",\n        \"\"\n      ]\n    }\n  ]\n}\n[/block]\nYou can also search, order the columns differently, and drill down by clicking hyperlinked data. If you click on an item in the threats column, you'll be presented with a detailed view of corresponding events.​\n[block:image]\n{\n  \"images\": [\n    {\n      \"image\": [\n        \"https://files.readme.io/t5bfx7q9QpyPU318DU7L_2015-08-31_1711.png\",\n        \"2015-08-31_1711.png\",\n        \"1146\",\n        \"502\",\n        \"#1ca384\",\n        \"\"\n      ]\n    }\n  ]\n}\n[/block]\nYou can hover over any portion of the graph to see counts for the data represented.\n[block:image]\n{\n  \"images\": [\n    {\n      \"image\": [\n        \"https://files.readme.io/fofbh59RQvy2SBiN7BpQ_2015-08-31_1713.png\",\n        \"2015-08-31_1713.png\",\n        \"1150\",\n        \"504\",\n        \"#5188c0\",\n        \"\"\n      ]\n    }\n  ]\n}\n[/block]\nAdditional information about threats reported in the bar graph can be found in the table at the bottom of this screen.\n[block:image]\n{\n  \"images\": [\n    {\n      \"image\": [\n        \"https://files.readme.io/jHMkxfnNRvSTNKg6Iw5E_2015-08-31_1715.png\",\n        \"2015-08-31_1715.png\",\n        \"1149\",\n        \"507\",\n        \"#b46d34\",\n        \"\"\n      ]\n    }\n  ]\n}\n[/block]\nClick the arrow in the leftmost column next to a Threat Type to see details for each reported incident.\n[block:image]\n{\n  \"images\": [\n    {\n      \"image\": [\n        \"https://files.readme.io/ZPqmUuWQSyNFlOITpi2s_2015-08-31_1718.png\",\n        \"2015-08-31_1718.png\",\n        \"1151\",\n        \"502\",\n        \"#e38f34\",\n        \"\"\n      ]\n    }\n  ]\n}\n[/block]\nIn the expanded view, you can click the View Details link next to any line item to see all the pertinent information about that specific event.\n[block:image]\n{\n  \"images\": [\n    {\n      \"image\": [\n        \"https://files.readme.io/mFYigS95QcazY8RubWop_2015-08-31_1720.png\",\n        \"2015-08-31_1720.png\",\n        \"1146\",\n        \"519\",\n        \"#7c4713\",\n        \"\"\n      ]\n    }\n  ]\n}\n[/block]\n\n[block:image]\n{\n  \"images\": [\n    {\n      \"image\": [\n        \"https://files.readme.io/g3Dbkt4UT8afTOMdZiDP_2015-08-31_1721.png\",\n        \"2015-08-31_1721.png\",\n        \"1149\",\n        \"519\",\n        \"#7c3c14\",\n        \"\"\n      ]\n    }\n  ]\n}\n[/block]\n\n[block:image]\n{\n  \"images\": [\n    {\n      \"image\": [\n        \"https://files.readme.io/sfOp0fdkTAKu0efzJwnR_2015-08-31_1722.png\",\n        \"2015-08-31_1722.png\",\n        \"1149\",\n        \"520\",\n        \"\",\n        \"\"\n      ]\n    }\n  ]\n}\n[/block]\nWe highly recommend you use the detailed information provided to review the portion of your code targeted by the attack to sanitize it. In the meantime, IMMUNIO will continue to block and detect based on your settings.","excerpt":"","slug":"attacks","type":"basic","title":"Attacks"}
[block:callout] { "type": "info", "body": "Keep in mind that this menu and all the options are also available per app. Just click on your app name to expand the list, and see the same time frame for all your applications." } [/block] Top portion of the Attacks view displays a graph of all attacks over the timeframe selected in the Date Range selector above. [block:image] { "images": [ { "image": [ "https://files.readme.io/b31392b-Attacks.png", "Attacks.png", 1421, 462, "#f3f4f4" ] } ] } [/block] Below this graph is a table of attacks plotted above, as well as detailed information including Start Time, Duration of the attack, Attacker IP or username, Threats reported and their Counts. [block:image] { "images": [ { "image": [ "https://files.readme.io/gJiSPMSTTUBvfn4XYRXX_2015-08-31_1705.png", "2015-08-31_1705.png", "1151", "503", "#8fa6b8", "" ] } ] } [/block] You can also search, order the columns differently, and drill down by clicking hyperlinked data. If you click on an item in the threats column, you'll be presented with a detailed view of corresponding events.​ [block:image] { "images": [ { "image": [ "https://files.readme.io/t5bfx7q9QpyPU318DU7L_2015-08-31_1711.png", "2015-08-31_1711.png", "1146", "502", "#1ca384", "" ] } ] } [/block] You can hover over any portion of the graph to see counts for the data represented. [block:image] { "images": [ { "image": [ "https://files.readme.io/fofbh59RQvy2SBiN7BpQ_2015-08-31_1713.png", "2015-08-31_1713.png", "1150", "504", "#5188c0", "" ] } ] } [/block] Additional information about threats reported in the bar graph can be found in the table at the bottom of this screen. [block:image] { "images": [ { "image": [ "https://files.readme.io/jHMkxfnNRvSTNKg6Iw5E_2015-08-31_1715.png", "2015-08-31_1715.png", "1149", "507", "#b46d34", "" ] } ] } [/block] Click the arrow in the leftmost column next to a Threat Type to see details for each reported incident. [block:image] { "images": [ { "image": [ "https://files.readme.io/ZPqmUuWQSyNFlOITpi2s_2015-08-31_1718.png", "2015-08-31_1718.png", "1151", "502", "#e38f34", "" ] } ] } [/block] In the expanded view, you can click the View Details link next to any line item to see all the pertinent information about that specific event. [block:image] { "images": [ { "image": [ "https://files.readme.io/mFYigS95QcazY8RubWop_2015-08-31_1720.png", "2015-08-31_1720.png", "1146", "519", "#7c4713", "" ] } ] } [/block] [block:image] { "images": [ { "image": [ "https://files.readme.io/g3Dbkt4UT8afTOMdZiDP_2015-08-31_1721.png", "2015-08-31_1721.png", "1149", "519", "#7c3c14", "" ] } ] } [/block] [block:image] { "images": [ { "image": [ "https://files.readme.io/sfOp0fdkTAKu0efzJwnR_2015-08-31_1722.png", "2015-08-31_1722.png", "1149", "520", "", "" ] } ] } [/block] We highly recommend you use the detailed information provided to review the portion of your code targeted by the attack to sanitize it. In the meantime, IMMUNIO will continue to block and detect based on your settings.