DORA Compliance
Use these DORA Compliance insights to monitor compliance metrics for information and communications technologies (ICTs). Compare compliance metrics within a specified date range spanning from the last 24 hours to 7 days, or use a custom date range.
Unencrypted Services in ICT Systems
Detect risky traffic in ICTs. Search for services, ports, and protocols that have unencrypted services. Unencrypted services in ICT systems may affect your ability to comply with DORA.
Critical ICT Roles with Risky Traffic
Monitor and view critical roles with risky traffic. Get insights about the top ICTs with malicious IP flows. Identify specific services in ICTs that are not encrypted, so that you can take encrypt them or quarantine them and minimize ICT risk.
3rd Party Dependencies for ICT Systems
Get insights into inbound and outbound traffic between ICT systems and third-party services. See which third party service categories are communicating with your ICT systems.
Top ICTs with Malicious IP Flows
See which of your ICT subscriptions or tenants has flows going to IPs that Illumio considers malicious.
Traffic Query Results
Filter traffic results by source IP, source zone, port, protocol, and much more. Filter the Source Zone column to see all of your Azure sources in one place.
NOTE: Switching between flows and bytes may change your displayed results. Suppose a resource with denied traffic has a large number of flows but zero bytes. In this case, switching the displayed results from flows to bytes would remove the resource from a Top 10 list due to the low byte count, replacing it with another resource that has a higher byte count.
View flow, IP, and resource details using slide-outs
Slide-outs provide additional information about specific flows, IP addresses, and resources. Click each to launch a slide-out and view additional details.