Create, Manage, and Analyze Threat Detection

Prev Next

Silent Push’s Monitoring feature is particularly useful for security teams and job roles with clearly defined defense duties focused on one or more distinct areas of an attack surface. By running an operation from within DNS Data, Threat Intelligence Management, or Attack Surface Management, results are generated, which can be monitored to produce an email every 24 hours that informs a user of any changes in the data.

Create a Monitor

Rather than re-running the same set of queries every day, organizations can save time and resources by automating cyber defense measures across an unlimited number of attack vectors at the click of a button.

  1. Run an operation within DNS Data, Threat Intelligence Management, or Attack Surface Management.

    1. Example: Go to DNS Data > Explore Indicator DNS Data, type example.com in the Lookup Passive DNS Records search bar.

  2. Click the Monitor button to apply a monitor that runs the query once every 24 hours. You'll be alerted when Silent Push detects new results via email (filtering/sorting options are not applied)

  3. Specify a Monitor name.

  4. Enter a Description.

  5. Toggle Email Notifications to receive the notifications.

  6. Click Save.

  7. The monitored query will now be visible in Monitors > Monitored Queries.

Manage a Monitor

Control and share monitors effectively:

  • Activate or Deactivate: Navigate to Monitors > Monitored Queries, move the Monitor Active slider to turn a monitor on or off.

  • Share a Monitor: Click the ellipsis menu on the far right, select Share Monitor to make it visible to your organization.

  • Change Name/Description: Click the ellipsis menu, choose Edit Monitor Metadata, update the Monitor Name and Description, then click Save.

Analyze and view results

Analyze monitored data with multiple options:

  • Historical Analysis: Navigate to Monitors > Monitored Queries, click History next to a monitor to view a table of new IoCs over 7 days.

    • Optionally, click the View icon (), to the left of the Monitor slider, click Copy, or Download to transfer raw data to your clipboard for integration.

    • Graphical Data: Mouse over the graph icon in Monitored Queries to see a 7-day bar chart of IoC activity. No data is rendered if no new IoCs are detected.