Hey, everyone, welcome back to the course. So in the last video, we went ahead and set up our wet application, and we integrated it with our fortunate 40 Web cloud. A weapon occasion fire was a server solution. And once you've done that and given it enough time again, it may take a couple of hours. But you should see that the D. N s status shows as okay right here.
So once you're shows as okay, you're good to go in this video, we're gonna go ahead and take a brief overview of the dashboard.
So the way we do that, we just select our application here,
and it's gonna take us into the dashboard screen itself.
Now you'll notice I've still got blocked mode off and we'll take a look at that when we get into our case studies in the next module
here we can see blocked request, if any. We can also see the number of requests. The data that were taken in the cost of that. In this example, you see only 14 kilobytes. Since this is brand new and it's $0 costs at this point, at least for the estimate.
We also see status of any servers we have. In this instance, I've only got the one there. We see the threat level information. So any history on the different threats,
any incoming requests, the throughput and any subscription service is as well.
We can also take a look at the logs here so we'll see any attack logs now again, In this instance, I don't have any. But I will be performing some attack in just a moment here and we'll see if it'll pick it up.
We can also look at threats by countries, threats by types and the threat map itself. Again, we don't have any data in there yet, As far as any attacks coming through,
we can take a look at our network. So any end points that we have as well a servers that we have set ups. We'll just click on those areas there. Now you'll notice we've got http or http s as well as our SSL until this
same with our servers. Here
we click on that, you'll see that we have our one server. And again, I'm just using http on that one, and it's showing that it's got an active health check going on security rules, which will come back to again in the case studies we can take a look at for known attacks,
and one of the neat features about this particular product is it allows you to create custom rules as well. So definitely, Ah, easy way of managing things and we'll talk about that again In the case study area.
We can also set requests. Limits are the access rules area.
It comes with Adidas protection as well,
and again it comes with a lot of default protections in place. And we could modify these based off our organizational needs.
And then, of course, our application delivery
and something else we can do is we can add additional modules to this. So if we just select at modules, we can go ahead and create our custom rules for security. And this is good for both your sort of entry level type of security person right? Somebody that's kind of newer to this, or this is a new product for them,
but they can also come in and create some custom rules as well as your more advanced practitioners that
can really deep dive into things. So it's definitely a very easy to use product for doing those things.
I'm gonna go ahead and cancel out of that.
So this video is just a really high level overview of the dashboard stuff to familiarize yourself with the navigation. I encourage you to pause this video and just play around a little bit inside of the dashboard
in the next module. We're gonna jump into a couple of case studies. Short case studies will take a look at a CE faras organizations and some of the examples where your particular organization may be using this type of product.