Monitoring Threats

Cloud Guard can detect patterns of activity that indicate possible malicious attempts to gain access to resources in your environment and use them for corrupt purposes.

About Threat Detector provides an introduction to how Cloud Guard's Threat Detector works.

You can perform the following tasks from the Threat Monitoring page: