Capture Security Appliance Administration Guide
Attack Origins
This maps the source locations of the files sent to the sandbox. These are the locations of the submitters.
Hover over the marker for details on source geo-location, number of submissions, and IP address.
Was This Article Helpful?
Help us to improve our support portal