The AC-Hunter Dashboard

Start Focusing Your Valuable Time on the Systems That Need Your Expertise With AC-Hunter

The Dashboard identifies which systems are most likely to be compromised and why.

You no longer need to dig through millions of log entries to identify suspect systems. We are now doing the first pass of the threat hunt for you and providing a threat score for each of your internal systems. All in a single easy-to-read dashboard.

Internal hosts are sorted by score in a list within the left-hand panel. The higher the score, the more likely the system has been compromised.

We also identify what specific threat activities were observed that resulted in that hosts’ score within the right-hand panel. Any of these flagged systems can be researched in depth using other modules within AC-Hunter.