/

Incidences

View all detected security threats in real-time. Every incident includes full context: severity, payload, origin, stacktrace, and AI-powered analysis.


Incidences Dashboard

The Incidences tab shows all threats detected across every device and session running your application.

ByteHide Monitor Incidences dashboard showing threat statistics cards and incidents table with severity levels, detection types, and actions takenClick to expand

Statistics Cards

Four cards at the top summarize your current security status:

CardDescription
Total IncidencesTotal number of detected threats
Critical ThreatsIncidents classified as High or Critical severity
Blocked ThreatsPercentage of threats that were automatically mitigated (Block, Close, Erase)
Pending ReviewIncidents awaiting manual review

Incidences Table

Each row represents a detected threat with the following columns:

ColumnDescription
TypeProtection module that triggered the detection (SqlInjection, DebuggerDetection, PathTraversal, etc.) with a color-coded badge
LevelSeverity badge: Critical (red), High (orange), Medium (yellow)
DescriptionSummary of the detected threat
OriginSource IP address with platform icon
DateTimestamp of when the threat was detected
ActionAction that was executed: Log (green), Block (red), Close (grey)
OptionsMenu with Mark as Read and Delete

Filters

Use the filter bar above the table to narrow down incidents:

ByteHide Monitor incidence filters showing Date Range, Level, Type, and Action dropdown menusClick to expand

FilterOptions
Date RangeCustom date range picker
LevelCritical, High, Medium, Low
TypeAll protection modules: Command Injection, Cross-Site Scripting (XSS), LDAP Injection, LLM Prompt Injection, NoSQL Injection, Path Traversal, SQL Injection, SSRF, XXE, and all desktop/mobile modules
ActionAll, Block, Close, Log

Incident Details

Click any incident row to open the detail panel with full forensic context.

ByteHide Monitor incident detail panel showing confidence gauge, technical details, SQL injection payload, stacktrace, and origin informationClick to expand

Incident Information

The header displays:

  • Confidence gauge: Semicircular gauge showing the detection confidence percentage (e.g., 90%)
  • Severity label: Critical, High, Medium, or Low
  • Protection module: The type of threat detected (e.g., SqlInjection)
  • Detection timestamp
  • Status badge: Current status of the incident (e.g., TO DO)
  • "Help me to understand it" button: Opens the AI Security Analysis

Technical Details

The technical details vary depending on the protection module type.

Web protection example (SQL Injection):

FieldExample
Module TypeSqlInjection
User Input' OR '1'='1
Injected Contentselect from where and or
SQL QuerySELECT * FROM Users WHERE Username = 'admin' AND Password = '' OR '1'='1'

Desktop protection example (Debugger Detection):

FieldExample
Module TypeDebuggerDetection
PayloadDebugger type and detection method

Stacktrace

A code block showing the execution call chain at the time of detection. This shows exactly which code path was executing when the threat was intercepted, from the Monitor interception point back to the application entry point.

Origin Information

FieldDescription
IP AddressSource IP of the request or device
DeviceDevice or server name
User AgentFull user agent string
Device IDUnique device identifier
PlatformApplication platform (web, mobile, desktop)
Session IDSession identifier (for tracking related incidents)

Tip

Review the stacktrace and payload to understand the attack vector. Consider implementing additional validation and sanitization measures for the affected code path.


AI Security Analysis

Click "Help me to understand it" on any incident to get an AI-powered explanation of the threat.

ByteHide Monitor AI Security Analysis modal showing attack explanation, business impact, attack vector, and severity analysisClick to expand

Analysis Tab

SectionDescription
What HappenedPlain-language explanation of the attack
Why It MattersPotential business impact: data breaches, compliance violations, reputational damage
Attack VectorTechnique used, entry point, and why it worked
Severity ExplanationWhy the incident is rated at its severity level
Confidence LevelAI model confidence in the analysis (High, Medium, Low)

Protection Status Tab

ByteHide Monitor AI Protection Status tab showing current protection level, Monitor capabilities, limitations, and action takenClick to expand

SectionDescription
Is ProtectedWhether the application is fully protected, partially protected, or in detection-only mode
What Monitor DoesCapabilities of Monitor for this type of threat
What Monitor Doesn't DoLimitations (Monitor does not fix code, does not modify application logic)
Action TakenDetailed description of the response action that was executed
Configuration RequiredWhether additional configuration is needed to improve protection

Incident Actions

Each incident row has an options menu (three dots) with:

  • Mark as Read: Removes the incident from the Pending Review count
  • Delete: Permanently removes the incident from the dashboard

Next Steps

Workflow Rules

Configure automatic responses to detected threats

Firewall

Block IPs, bots, and threat actors proactively

Devices & Sessions

Track devices and drill into session timelines

Protection Modules

All available protection modules that generate incidents

Previous
Creating a Project