View Threat Activity Breakdown

Overview

Use Threat Activity Breakdown to investigate API threats detected by Akto. You can move from high-level monitoring to detailed drilldowns, apply filters, review complete request–response data, and take targeted remediation actions.

Access the Threat Activity View

1

Log in to your Akto account.

2

Head to API Security.

3

From the side navigation bar and select API Threat Detection.

4

Click on Threat Activity.

5

Review activities under Active, Under Review, and Ignored.

6

Select an activity to open its drilldown view.

Refine Threats Using Filters

Explore the Detailed View

The drilldown view presents all relevant information for a selected threat activity, including severity, impacted API endpoint, and detected attack category.

The view contains four tabs that structure the investigation flow:

Presents the description, details, and impact of the activity, giving you a clear understanding of the threat.

Update the Status

Use Event Actions option to update the status of an activity:

  • Mark for Review – Move the activity into the review workflow.

  • Ignore – Remove the activity from the active threat list.

Block the Traffic From the Source IP

Use Block IP button to immediately stop further activity from the malicious source.

For more details, continue to the 1. Block an IP from Threat Actors learn more.

Create Internal Workflow Item

You can create a Jira ticket or a Work Item directly from the threat activity view to support internal tracking, ticketing, and coordinated remediation.

To learn more about creating and configuring these items, head to the Create Internal Workflow Item.

Last updated

Was this helpful?