RedRok Intelligence – Main Interface

Welcome to the RedRok Intelligence Dashboard! This tutorial will guide you through the interface’s main features of our intelligence platform, ensuring you understand how to navigate and utilize each section effectively. This section provides an overview of the main components available in the Dashboard, helping users leverage its capabilities for better threat intelligence and security monitoring.

Regularly monitor the dashboard to stay updated on security alerts, threats, and exposure trends. Adjust settings to ensure you receive timely notifications for critical incidents.

1. Demo Company’s Alerts

This section lists the current alerts for Demo Company, categorized by severity.

  • Severity Levels: Indicators like Medium and Low highlight the importance of each alert.
  • Details: Each alert shows the type of finding (e.g., ‘Non Domain User’), status (New threat), and the date it was detected.
  • Action: Click on an alert to view detailed information and recommended actions.

2. Exposure Over Time

This graph shows the exposure trends over time for Demo Company, its supply chain, and industry field.

  • Lines: Different colors represent exposure trends for Demo Company, supply chain, and industry field.
  • Timeline: Helps in tracking the rise and fall of exposure levels over time.

3. Supply Chain Threats

Displays threats identified within the supply chain, specifically for key suppliers.

  • Lists the names of suppliers and the frequency of threats detected for each supplier.
  • Monitor regularly to identify high-risk suppliers and prioritize security reviews.

4. Industry Field Threats

Lists threats identified within the industry field, showing companies and the frequency of detected threats.

Use this data to understand industry-specific threat trends and benchmark your company’s security posture.

5. Recent Leaked Assets (8 Weeks)

Summarizes the recent leaked assets over the past eight weeks, providing a snapshot of data breaches.

6. Threat Analytics

Provides a geographical representation of threat incidents, showing where threats have been detected.

  • Map visualization highlights threat locations.
  • Adjust security measures based on geographic threat distribution.
 
By following this tutorial, you should be well-equipped to navigate and make the most of the Red Dashboard. Regularly review each section to stay on top of security threats and ensure proactive threat mitigation.