Skip to main content

Getting Started with Illumio Insights

Illumio Insights Overviews and Use Cases

Resource Traffic

The Resource Traffic dashboard allows you to examine a single resource in detail. You can access all related metadata, resources connected to it, and see in real time what it’s directly interacting with—visualized through the Resource Traffic Map. Other widgets on this page help you identify if it has been engaging with malicious IPs, attempting external data transfers, or using potentially risky protocols.

Watch the overview video.

Resource_Traffic.png

Risky Traffic

The Risky Traffic dashboard focuses investigation on the use of potentially dangerous ports and protocols in your environment—these are services that attackers are known to exploit for lateral movement.

When you select any protocol from the “Risky Services Traffic” widget, it updates all other widgets on the page to show data related to that protocol. From there, you can review specific types of workloads that participated in this traffic, review activity patterns, see zone and account traversal, and more.

Watch the overview video.

Risky_Traffic.png

Malicious IP Threats

The Malicious IP Threats dashboard shows activity between known malicious IPs and your environment. It displays the top talkers, the locations of these malicious IPs worldwide, as well as specific accounts, workloads, and protocols that are being targeted.

Watch the overview video.

Malicious_IPs.png

Shadow LLMs

Use the Shadow LLMs dashboard to see which publicly accessible LLM services your resources are accessing and exchanging data with. You can view the specific LLMs being used, the accounts associated with this activity, and the resources involved in the access.

Watch the overview video.

Shadow_LLMs_In_Use.png

External Data Transfer

The External Data Transfer dashboard highlights data leaving your environment for destinations on the internet. You can see where your data is being sent, which protocols are used for the transfer, and details about specific workloads and workload types involved.

Watch the overview video.

External_Data.png

DORA Compliance

One of the main requirements of the EU’s Digital Operational Resilience Act (DORA) is monitoring risks related to franchise-critical Information and Communication Technology (ICT) systems. The DORA Compliance dashboard combines important widgets from other Insights dashboards into a single view to assist with monitoring, detection, response, and reporting needs of DORA.

Watch the overview video.

DORA_Compliance.png

Country Insights

Use Country Insights to monitor global traffic and spot suspicious patterns in unexpected regions. Filter traffic by Cloud Service Provider (CSP) regions—such as Northern Europe AWS data centers—to analyze traffic origins and detect risky connections.

Watch the overview video

Country_Insights.png

Insights Use Cases

Now that you’re familiar with what’s available in Insights, here are some common use cases to help you explore further.