Mitigated Traffic
The Mitigated Traffic page contains data concerning blocked login attempts.
Terms
The following table defines terms you may encounter when using the Mitigated Traffic page.
Mitigated Traffic terms
Q2 proprietary intelligence feeds |
Q2’s proactive and reactive internal threat feeds that block harmful activity based on observed malicious undertaking on Q2 platforms. These convicted sources are used to enhance Q2's security mitigations.
|
External threat feeds |
Q2’s proactive external threat feeds, which are informed by industry experts of varying specialization and block malicious activity. These feeds are also used to determine tactical responses to attacks at various levels of Q2's infrastructure.
|
Anti-automation |
A collection of proactive tools and methods that identify non-human traffic, such as traffic attempting to disguise itself as a common browser or user.
|
Geo-restrictions |
A collection of proactive tools and methods that restrict traffic based on the location of a client's IP address. OFAC (Office of Foreign Asset Control) or OFAC + High Risk blocks would also show here.
|
Session anomaly / rate limiting |
A collection of reactive and proactive tools and methods that inspect and inform methodology for mitigation(s) at multiple layers of the perimeter in real time. These powerful tools regulate potentially malicious activity. Convicted portions are mitigated in real time.
|
Total traffic mitigated
|
The number of requests flagged as malicious and blocked.
|
Traffic flagged as malicious
|
The percentage of traffic flagged as malicious and blocked.
|