Capture Security Appliance Administration Guide

Attack Origins

This maps the source locations of the files sent to the sandbox. These are the locations of the submitters.

Hover over the marker for details on source geo-location, number of submissions, and IP address.

Was This Article Helpful?

Help us to improve our support portal

Techdocs Article Helpful form

  • Hidden
  • Hidden

Techdocs Article NOT Helpful form

  • Still can't find what you're looking for? Try our knowledge base or ask our community for more help.
  • Hidden
  • Hidden