Tetap teratur dengan koleksi
Simpan dan kategorikan konten berdasarkan preferensi Anda.
Halaman ini menjelaskan cara melihat ancaman yang terdeteksi oleh endpoint firewall untuk traffic yang dicegat menggunakan konsol Google Cloud .
Endpoint firewall melakukan deteksi dan pencegahan ancaman berbasis tanda tangan pada
traffic yang dicegat dari instance virtual machine (VM) Anda.
Cloud Next Generation Firewall menyediakan tanda tangan
ancaman default, tingkat keparahan ancaman yang didukung, dan penggantian ancaman yang
Anda gunakan untuk mengidentifikasi aktivitas berbahaya dan mencegah serangan jaringan.
Gunakan halaman Ancaman untuk melihat ancaman yang terdeteksi di jaringan Anda selama jangka waktu tertentu.
Untuk melihat ringkasan ancaman yang diamati selama jangka waktu tertentu di jaringan
Anda, buka Dasbor Cloud NGFW.
Untuk mendapatkan izin yang diperlukan guna melihat halaman ancaman, minta
administrator untuk memberi Anda peran Identity and Access Management (IAM) yang diperlukan di
organisasi Anda. Untuk mengetahui informasi selengkapnya tentang cara memberikan peran, lihat
Mengelola akses.
Lihat ancaman
Izin yang diperlukan untuk langkah ini
Untuk melakukan tugas ini, Anda harus telah diberi izin berikut
atau salah satu peran IAM berikut di organisasi Anda.
Pilih rentang waktu yang ingin Anda gunakan untuk melihat ancaman yang terdeteksi. Anda
dapat memilih durasi dari 1 jam hingga 30 hari.
Ancaman yang terdeteksi selama jangka waktu yang dipilih akan ditampilkan.
Opsional: Untuk lebih menyaring ancaman yang tercantum, pilih satu atau beberapa filter berikut:
Keparahan
Waktu pemberitahuan aktif
Waktu pemberitahuan sebelum
Waktu pemberitahuan setelah
Nama ancaman
Jenis ancaman
Untuk melihat log ancaman tertentu, klik Lihat log audit di samping
nama ancaman.
Halaman Cloud Logging akan muncul yang menampilkan log mendetail untuk
ancaman yang dipilih. Untuk memahami struktur log ancaman, lihat
Log ancaman.
[[["Mudah dipahami","easyToUnderstand","thumb-up"],["Memecahkan masalah saya","solvedMyProblem","thumb-up"],["Lainnya","otherUp","thumb-up"]],[["Sulit dipahami","hardToUnderstand","thumb-down"],["Informasi atau kode contoh salah","incorrectInformationOrSampleCode","thumb-down"],["Informasi/contoh yang saya butuhkan tidak ada","missingTheInformationSamplesINeed","thumb-down"],["Masalah terjemahan","translationIssue","thumb-down"],["Lainnya","otherDown","thumb-down"]],["Terakhir diperbarui pada 2025-09-01 UTC."],[[["\u003cp\u003eThis page outlines the process of viewing threats detected by firewall endpoints in the Google Cloud console, which perform signature-based threat detection on traffic from your virtual machine (VM) instances.\u003c/p\u003e\n"],["\u003cp\u003eYou can access a summary of network threats within a specified time period through the Cloud NGFW Dashboard.\u003c/p\u003e\n"],["\u003cp\u003eTo view threats, users need to navigate to the \u003cstrong\u003eThreats\u003c/strong\u003e page in the Google Cloud console and must have the required IAM permissions or roles within their organization.\u003c/p\u003e\n"],["\u003cp\u003eThe listed threats can be refined by applying filters such as severity, alert time, threat name, and threat type, allowing for a more focused analysis.\u003c/p\u003e\n"],["\u003cp\u003eYou can view audit logs for each specific threat detected by clicking "View audit log", and the cloud logging page will display the detail logs.\u003c/p\u003e\n"]]],[],null,["# View threats\n\nThis page explains how to view threats detected by the firewall endpoint for\nthe intercepted traffic by using the Google Cloud console.\n\nFirewall endpoints perform signature-based threat detection and prevention on\nthe intercepted traffic from your virtual machine (VM) instances.\nCloud Next Generation Firewall provides default\nthreat signatures, supported threat severity levels, and threat overrides that\nyou use to identify malicious activity and prevent network attacks.\nUse the **Threat** page to view threats detected in your network during a\nspecific timeframe.\n\nTo view a summary of the threats observed during a specific period in your\nnetwork, go to the Cloud NGFW [Dashboard](https://console.cloud.google.com/net-security/firewall-manager/dashboard/cards).\n\nTo learn more about threats, see [Threat signatures overview](/firewall/docs/about-threats).\n\nRoles and permissions\n---------------------\n\nTo get permissions that you need to view the threat page, ask your\nadministrator to grant you the necessary Identity and Access Management (IAM) roles on your\norganization. For more information about granting roles, see\n[Manage access](/iam/docs/granting-changing-revoking-access).\n\nView threats\n------------\n\n#### Permissions required for this task\n\nTo perform this task, you must have been granted the following permissions\n*or* one of the following IAM roles on your organization.\n\n**Permissions**\n\n- `networksecurity.securityProfiles.create`\n\n**Roles**\n\n- `compute.networkAdmin` \n\n### Console\n\n1. In the Google Cloud console, go to the **Threats** page.\n\n [Go to Threats](https://console.cloud.google.com/net-security/threats/list)\n2. If necessary, select your Google Cloud project.\n\n3. Select the timeframe for which you want to view the threats detected. You\n can select the duration from 1 hour to 30 days.\n Threats detected during the selected timeframe are displayed.\n\n4. Optional: To further refine the listed threats, select one or more of\n the following filters:\n\n - Severity\n - Alert time on\n - Alert time before\n - Alert time after\n - Threat name\n - Threat type\n5. To view logs for a specific threat, click **View audit log** next to the\n threat name.\n The Cloud Logging page appears that displays the detailed logs for\n the selected threat. To understand the threat log structure, see\n [Threat logs](/firewall/docs/threat_logs).\n\nWhat's next\n-----------\n\n- [Create and manage security profiles](/firewall/docs/configure-security-profiles)\n- [Create and manage security profile groups](/firewall/docs/configure-security-profile-groups)\n- [Create and manage firewall endpoints](/firewall/docs/configure-firewall-endpoints)\n- [Create and manage firewall endpoint associations](/firewall/docs/configure-firewall-endpoint-associations)"]]