Skip to main content

Getting Started with Illumio Insights

DORA Compliance

Use these DORA Compliance insights to monitor compliance metrics for information and communications technologies (ICTs). Compare compliance metrics within a specified date range spanning from the last 24 hours to 7 days, or use a custom date range.

  • Unencrypted Services in ICT Systems

    Detect risky traffic in ICTs. Search for services, ports, and protocols that have unencrypted services. Unencrypted services in ICT systems may affect your ability to comply with DORA.

  • Critical ICT Roles with Risky Traffic

    Monitor and view critical roles with risky traffic. Get insights about the top ICTs with malicious IP flows. Identify specific services in ICTs that are not encrypted, so that you can take encrypt them or quarantine them and minimize ICT risk.

  • 3rd Party Dependencies for ICT Systems

    Get insights into inbound and outbound traffic between ICT systems and third-party services. See which third party service categories are communicating with your ICT systems.

  • Top ICTs with Malicious IP Flows

    See which of your ICT subscriptions or tenants has flows going to IPs that Illumio considers malicious.

  • Traffic Query Results

    Filter traffic results by source IP, source zone, port, protocol, and much more. Filter the Source Zone column to see all of your Azure sources in one place.

NOTE: Switching between flows and bytes may change your displayed results. Suppose a resource with denied traffic has a large number of flows but zero bytes. In this case, switching the displayed results from flows to bytes would remove the resource from a Top 10 list due to the low byte count, replacing it with another resource that has a higher byte count.

View flow, IP, and resource details using slide-outs

Slide-outs provide additional information about specific flows, IP addresses, and resources. Click each to launch a slide-out and view additional details.