Suspicious Connections Threshold

Track connections with IP addresses identified in blacklist databases or tracked with the IP Reputation Library.

See conversations with known Tor client exit points and much more.

Note: You can associate threshold events with pre-configured chains of alert notifications to match your site's policies.

Managing Suspicious Connections Thresholds:

Tip: Use the Suspicious Connections Report to view, analyze, and share the frequency, direction, and overall character of suspicious events. The Suspicious Connections Report can show both in an out of threshold events.

From the Thresholds Library in the WhatsUp Gold Alert Center Libraries view, you can perform the following Suspicious Connections Threshold operations.

Add. Create a new Suspicious Connections Threshold.

Edit. Adjust, tune, and configure an existing Suspicious Connections Threshold.

Copy. Clone a new Suspicious Connections Threshold based on an existing Suspicious Connections Threshold's configuration.

Delete. Remove Suspicious Connections Threshold from library.

See Also

Thresholds Library

Log Management Filter Frequency Threshold

CPU Threshold

Custom Threshold

Disk Utilization Threshold

Interface Threshold

Interface Errors and Discard Threshold

Memory Threshold

Ping Availability Threshold

Ping Response Time Threshold

SNMP Trap Threshold

Windows Event Log Threshold

Syslog Threshold

Hyper-V Event Threshold

VMware Threshold

Blackout Summary Threshold

Failover Threshold

WhatsUpHealth Threshold

Conversation Partners Threshold

Network Traffic Analysis Custom Threshold

Failed Connections

Interface Traffic Threshold

Top Sender/Receiver

Access Point Memory Threshold

Access Point CPU Threshold

Banned Client MAC Threshold

Device Over Subscription Threshold

Excessive Rogue Threshold

Rogue Access Point MAC Address Threshold

Rogue Hidden SSID Threshold

Rogue Specific SSID Threshold

Rogue Unknown SSID Threshold

Wireless Access Point RSSI Threshold

Wireless Clients Bandwidth Threshold