Monitoring Threats
Cloud Guard can detect patterns of activity that indicate possible malicious attempts to gain access to resources in your environment and use them for corrupt purposes.
About Threat Detector provides an introduction to how Cloud Guard's Threat Detector works.
You can perform the following tasks from the Threat Monitoring page:
- Listing Sightings and Getting Their Details
- From the Threat Monitoring page, you can see resource profiles and their key attributes to quickly identify the highest priority events.