The Attack Map page is a visual representation of the entire network showing real endpoints, Deception VMs, and ongoing attacks.
- Go to Incident > Attack Map.
- At the bottom of the Attack Map, click and drag in the timestamp indicator to identify a start and end time.
- Click the Filter Input box to choose a different filter type and type values.
You can input multiple arguments with different filter types. All the filter arguments and the time indicator arguments are considered "AND" conditions.
The filter types are as follows:
- Attacker IP
- Victim IP
- Deception VM IP
Click the Save View button, which has the icon of Removable Disk.
Scroll the mouse to zoom in and out on the Attack Map.