/

Cloud Panel

The Cloud Panel is the web dashboard for managing Monitor projects, monitoring threats in real-time, configuring automated responses, and analyzing security incidents.


ByteHide Monitor Cloud Panel dashboard showing Incidences tab with threat statistics, severity levels, and detected security incidentsClick to expand

Dashboard Tabs

The Cloud Panel is organized into six tabs. Each tab focuses on a specific aspect of your application's runtime security.

TabDescription
IncidencesAll detected threats with severity, origin, action taken, and AI-powered analysis
FirewallBlock bots, threat actor IPs, countries, custom IPs, and user agents
RoutesAPI endpoint usage and request patterns (web/cloud projects only)
OverviewDevices, sessions, geographic distribution map, and recent incidents
WorkflowAutomation rules (IF threat THEN action) and advanced configuration
SettingsProject token, session duration, token reset, and project management

Project Types

When creating a Monitor project, you choose the project type based on your application. This determines which protections and firewall features are available.

On-Premise / Desktop / MobileCloud / Web / API
Protections13 passive detectors (debugger, VM, jailbreak, tampering, etc.)9 active interceptors (SQL injection, XSS, SSRF, etc.)
ActionsLog, Close, Erase, NotificationsLog, Block, Block session, Block IP, Notifications
FirewallDevice-level blockingBots, threat actor IPs, countries, custom IPs, user agents
Routes tabNot availableAvailable

Both project types include the Incidences, Firewall, Overview, Workflow, and Settings tabs. See Protection Modules for the full list of available protections.


Getting Started

  1. Create a Project: Choose your platform and project type
  2. Copy your token: Get the project token from the Settings tab
  3. Install Monitor: Add the SDK to your application with the token
  4. Configure rules: Set up Workflow Rules to define automated responses
  5. Monitor incidents: Threats appear in real-time in the Incidences tab

Explore the Cloud Panel

Create a Project

Set up your first Monitor project

Incidences

Threat monitoring with AI-powered incident analysis

Firewall

Block bots, threat actors, countries, and custom IPs

Routes

API endpoint usage and request patterns

Overview

Devices, sessions, and geographic distribution

Workflow

Automation rules and advanced configuration

Settings

Project token and session management

Previous
Custom