Fig. 1: Monitor Application Event Map
Fig. 2: Configuring Hi-Risk Attack Mitigation
Fig. 3: View Events Detail