We want to provide Imunify360 users with powerful and comprehensive tool for events and incident analysis within the separate service, so they could:
Find the incidents by IP address, components, username, domain, etc. across multiple servers in the group.
To use the feature, simply log in your CLN account, navigate to the Imunify360 tab and open the "Events & Incidents lookup" page to search for IP-related incidents and events.
It is possible to search for all incidents within the selected period, related to the specified IP within the specified group of servers.
There is an option to choose the scope among available groups of servers as a filter for search. You also can choose the period of time as a filter for search.
The new functionality provides you with a tool to view logs showing malicious actions from specific IP addresses, which can be used in the investigation process and to provide proof of certain activity of a specific IP address. This allows to speed up analysis of the attack and to provide evidence of it.
It also makes possible tracing security settings and quickly find a reason why this account was allowed access and why another was blocked instead. You can also simply copy the link and share it with fellow team members in the process of investigation or reporting in order to reveal details of the incident.
Examples:
Limitations: