# Threat Prevention Dashboard

Review the malicious traffic characteristics for the period of time with the **Threat Prevention** dashboard. Get clear vision of the malicious traffic volume and its distribution by attack types, sources, protocols, authentication methods, etc.

The dashboard helps in identifying the threat patterns. A clear view of how attackers are trying to exploit the system enables faster detection of threats and better-informed responses. This contributes to overall security posture improvement and helps in taking proactive measures.

As different attack types (e.g., DDoS, SQL injection, brute force) and protocols (e.g., HTTP, HTTPS, FTP) may require different defense strategies, knowing the distribution of attack methods and traffic, security teams can implement specific countermeasures (e.g., rate-limiting, firewall rules, WAAP configurations, etc.) that prevent further incidents.

The information is presented in the following widgets:

* Speed of request encountering
* Normal and malicious traffic
* Summary for a period
* Attack sources
* Attack targets
* Attack types
* CVEs
* Attacks on API protocols
* Authentication in attacks

<div>
  <script src="https://js.storylane.io/js/v1/storylane.js"></script>
  <div class="sl-embed" style="position:relative;padding-bottom:calc(55.04% + 25px);width:100%;height:0;transform:scale(1)">
    <iframe loading="lazy" class="sl-demo" src="https://wallarm.storylane.io/demo/atbicsvjibs7" name="sl-embed" allow="fullscreen" allowfullscreen style="position:absolute;top:0;left:0;width:100%!important;height:100%!important;border:1px solid rgba(63,95,172,0.35);box-shadow: 0px 0px 18px rgba(26, 19, 72, 0.15);border-radius:10px;box-sizing:border-box;"></iframe>
  </div>
</div>

Consider the following:

* [Hit](https://docs.wallarm.com/glossary-en.md#hit) is a malicious request plus metadata added by node
* Number of blocked hits may be less than detected ones as [traffic filtration mode](https://docs.wallarm.com/admin-en/configure-wallarm-mode.md) may be just `monitoring` for some locations
* You can read attack type descriptions [here](https://docs.wallarm.com/attacks-vulns-list.md)
