Fortinet black logo

Attack Map

Copy Link
Copy Doc ID e09daf98-5af9-11e9-81a4-00505692583a:708968
Download PDF

Attack Map

The Attack Map page is a visual representation of the entire network showing real endpoints, Deception VMs, and ongoing attacks.

To change filtering arguments:
  1. Go to Incident > Attack Map.
  2. At the bottom of the Attack Map, click and drag in the timestamp indicator to identify a start and end time.
  3. Click the Filter Input box to choose a different filter type and type values.

    You can input multiple arguments with different filter types. All the filter arguments and the time indicator arguments are considered "AND" conditions.

    The filter types are as follows:

    • Attacker IP
    • Victim IP
    • Deception VM IP
To locate the node in the map:

In the LOCATE box, type the IP address, and press Enter.

To save a snapshot of the map:

Click the Save View button, which has the icon of Removable Disk.

To change display options:

Scroll the mouse to zoom in and out on the Attack Map.

Attack Map

The Attack Map page is a visual representation of the entire network showing real endpoints, Deception VMs, and ongoing attacks.

To change filtering arguments:
  1. Go to Incident > Attack Map.
  2. At the bottom of the Attack Map, click and drag in the timestamp indicator to identify a start and end time.
  3. Click the Filter Input box to choose a different filter type and type values.

    You can input multiple arguments with different filter types. All the filter arguments and the time indicator arguments are considered "AND" conditions.

    The filter types are as follows:

    • Attacker IP
    • Victim IP
    • Deception VM IP
To locate the node in the map:

In the LOCATE box, type the IP address, and press Enter.

To save a snapshot of the map:

Click the Save View button, which has the icon of Removable Disk.

To change display options:

Scroll the mouse to zoom in and out on the Attack Map.