🌐
Portal Docs
  • ✨Overview
  • 📊Dashboards
    • 📈Traffic Overview
    • 🔍Analysis
    • 🔴Paths Attacked
    • 👁️‍🗨️Known Bots
    • ⚡Response Overview
    • ⚡Challenge Performance
    • ⚡Top Attack Sources
    • 🔬Profiling
    • 🔬Details
    • 🔍POV Report
  • ✏️Management
    • ‼️Quarantine
    • ☑️Trusted List Management
    • 📃Audit Trail
  • 🧮Configuration
    • ⚙️Datastream Configurations
      • 🛠️Integration details
      • 👾Challenge configuration
      • 🔧Threat and Trust Lists
  • 👥User Management
    • Single Sign On (SSO)
      • SAML SSO Setup
      • Okta SSO Setup
      • Entra ID SSO Setup
      • SSO FAQs
    • IP Restriction
  • ❔Glossary of Terms
  • 📗User Guides & Videos
    • Portal Setup & Log Shipping Guide
  • 🧙‍♀️Customer Service Desk
  • 📖Integrations Documentation
  • Release notes
    • Version 1.7
    • Version 1.6
    • Version 1.5
    • Version 1.4
    • Version 1.3
    • Version 1.2
    • Version 1.1
    • Version 1
Powered by GitBook
On this page
  • What’s New in Version 1.6?
  • Decision Logic
  • Known Attack Signals
  • Interactive Subway Tube Map
  1. Release notes

Version 1.6

Release Date: February, 2025

PreviousVersion 1.7NextVersion 1.5

Last updated 3 months ago

Version 1.6 of Atlas, the Netacea customer portal is here.

What’s New in Version 1.6?

Decision Logic

All quarantine items have now been enhanced with a table that explains the logic behind why Netacea have made the decision to quarantine that item. These insights will explain the nuances of why the Netacea solution identified a request as a threat and help your analysts understand the behavior of attackers within the context of your business logic. This includes:

  • Details of the attack signals that have been identified by Netacea’s detection models and used to identify this item as malicious

  • Details of what Netacea has identified as the BLADE Framework items that relate to the activities that attackers are undertaking.

The BLADE Framework is the Business Logic Attack Definition Framework, an open-source knowledge base created to help cybersecurity professionals identify the phases, tactics and techniques used by adversaries to exploit weaknesses in the business logic of web facing systems (websites, mobile apps and APIs).

Known Attack Signals

As well as detecting attackers based on real time analysis of attacker activity Netacea also has a set of prebuilt, continually curated sets of identified sources of attack based on analysis of attacker behaviour across the Netacea network of customer.

These sets, called Known Attack Signal (KAS) lists can be enabled to stop any incoming requests that match items in the list, speeding up times to detection ahead of the first request from attackers being received.

You now have visibility of Known Attack Signal (KAS) lists, allowing you to see which KAS lists you are subscribed to, and what is blocked by them.

Interactive Subway Tube Map

We heard your feedback that you wanted to be able to click on the subway tube map to navigate the site! The team have now made the visualisation clickable, so that you can travel to the part of the journey you’re interested in.