ActivityMap is a tool that provides real-time visual representation of the L4 to L7 protocol activity between devices in your network. It enables you to track the connection of devices across your environment, identify impacted areas and determine whether a device is still connected.
It’s free to use with Adobe Analytics and automatically tracks clicks on links within your website without requiring additional development. It can be implemented as a standalone solution or as a part of an existing Adobe Analytics deployment.
How it works
In addition to displaying device connections on a 2D map, you can switch between a 3D layout by clicking the 3D icon in the upper left corner of the page. The 3D layout displays the data in a dynamic, rotating model that makes it easy to see connections from different points on your network, including between devices in the same location and across multiple locations.
How it displays detections
When a device on your activity map Things to do in Toronto has associated detections, the device is displayed as an animated pulse around the circle label. This detection marker also includes a drop-down menu, which allows you to navigate to a detail page with more information about the detection.
What it measures
When you enable the Time interval for your map, real-time data is continually updated to reflect the latest events in the event database. You can change the time interval to see more detailed data in a longer or shorter time frame. If you change the time interval, it might take up to 24 hours for the changes to be reflected on your map.
How it plots log data and geographic locations
The Threat Activity Map widget is a visualization of the volume of events occurring in your deployment based on location data from logs entering the Data Indexer. It is a great starting point for analysts to begin investigating locations that have an impact on the security of your organization’s environment.
It is a powerful tool that is easily integrated into your deployment with an existing data processor or can be implemented as a standalone solution for your network. It is an essential tool for any organisation that wants to protect their data against attacks and threats by monitoring a variety of network traffic and event data.
How it helps you plan and monitor your migrations
A good way to prepare for a server or service migration is to create an activity map to see which services and devices are still connected after the change is complete. This can help you prevent unexpected service disruptions during the migration.
You can filter the devices on your map by their group membership. You can also filter by their step in a step-based activity map.
The map is organized by steps that are based on protocol activity. In addition to showing device connections, the map shows other important information such as bytes and TCP turns. You can also create a comparison map that compares two or more time intervals to highlight differences in activity between the times they were captured.