Understanding your Securd usage metrics.
In the Account -> Plan Usage section, you can see a real-time view of your Securd usage metrics.
Viewing Aggregated Query Metrics
This analytic shows the volume of DNS queries from all your companies based on your selected time frame. In this analytic, you can view your metrics for the last 30, 60 and 90 days. To see a breakdown of each of your company (tenant) metrics, use the Company dashboard.
Viewing Aggregated Log Forward Metrics
This analytic shows the volume of logs forwarded from all your companies based on your selected time frame. Learn more about forwarding your Securd logs in real-time with http log forwarding or syslog forwarding.
Securd Dashboard Overview
Note: Each company (tenant) has a unique dashboard. Learn more about companies. The Securd dashboard provides administrators with a high-level time-based summary into key security metrics and information about a company's underlying activity. Threat ...
Understanding DNS Graph Defense™
Graph Defense™ is proprietary ranking & domain trustworthiness system developed by Securd. The intent of the system is to score established, long-lasting and tightly linked Internet infrastructure, domains and assets that are highly correlated less ...
Understanding How Multi-Tenant Works
With Securd, you can create multiple companies. Companies can be used in a variety of ways to segregate Securd by customer, organization or other logical segregation option of your choice. Every Securd "Company" is a separate tenant of Securd and has ...
Threat Hunting with Securd
A cloud-based DNS firewall, such as Securd, can be an effective tool for threat hunting by security analysts. Here is a step-by-step guide on how a security analyst can use Securd for threat hunting: Set up Securd: The first step in using Securd for ...
Enabling DNSSEC in Securd
DNSSEC (Domain Name System Security Extensions) is a security protocol that provides authentication for DNS data. It is used to protect the internet's global Domain Name System (DNS) infrastructure from various types of attacks, such as spoofing and ...