Examine the source IPs and users responsible for generating command and control (C2)
traffic.
Examine the source IPs and users responsible for generating command and control (C2)
traffic. Advanced Threat Prevention uses cloud-based engines and
inline cloud analysis to detect and analyze
traffic for unknown C2 and vulnerabilities. Click the search icon next to the source IP
to review the
usage
patterns related to the source IP. A contextual link to
Log Viewer
helps to analyze the threat sessions, download the packet capture and cloud report to
get additional context and leverage Palo Alto Networks threat analytics data and improve
your incident response processes.