Administration Portal Help Center Product Info Getting Started FAQs Release Notes
Product Info
Getting Started
Release Notes
Table Of Contents  

Hosts Overview

This page lists compromised hosts and their associated threat levels. From here, you can monitor and mitigate malware detections on a per host basis.

Compromised hosts are systems for which there is a high confidence that attackers have gained unauthorized access. When a host is compromised, the attacker can do several things to the computer, such as:

In Sky ATP, compromised hosts are listed as secure intelligence data feeds (also called information sources.) The data feed lists the IP address or IP subnet of the host along with a threat level; for example, and threat level 5. Once identified, Sky Advanced Threat Prevention recommends an action and you can create security policies to take enforcement actions on the inbound and outbound traffic on these infected hosts.

Export Data—Click the Export button to download compromised host data to a CSV file. You are prompted to narrow the data download to a selected time-frame.

Related Documentation

Help us to improve. Rate this article.
Feedback Received. Thank You!

Ask questions in TechWiki

Check documentation in TechLibrary

Rating by you:          

Additional Comments

800 characters remaining

May we contact you if necessary?


Need product assistance? Contact Juniper Support