이 페이지에서는 Google Cloud 콘솔을 사용하여 가로채기된 트래픽에 대해 방화벽 엔드포인트에서 감지한 위협을 보는 방법을 설명합니다.
방화벽 엔드포인트는 가상 머신(VM) 인스턴스에서 가로채기된 트래픽에 대해 서명 기반 위협 감지 및 방지를 수행합니다.
Cloud Next Generation Firewall은 악의적인 활동을 식별하고 네트워크 공격을 방지하는 데 사용하는 기본 위협 서명, 지원되는 위협 심각도 수준, 위협 재정의를 제공합니다.
위협 페이지를 사용하여 특정 기간 동안 네트워크에서 감지된 위협을 봅니다.
네트워크에서 일정 기간 동안 관찰된 위협을 요약해서 보려면 Cloud NGFW 대시보드로 이동합니다.
[[["이해하기 쉬움","easyToUnderstand","thumb-up"],["문제가 해결됨","solvedMyProblem","thumb-up"],["기타","otherUp","thumb-up"]],[["이해하기 어려움","hardToUnderstand","thumb-down"],["잘못된 정보 또는 샘플 코드","incorrectInformationOrSampleCode","thumb-down"],["필요한 정보/샘플이 없음","missingTheInformationSamplesINeed","thumb-down"],["번역 문제","translationIssue","thumb-down"],["기타","otherDown","thumb-down"]],["최종 업데이트: 2025-04-22(UTC)"],[[["\u003cp\u003eThis page outlines the process of viewing threats detected by firewall endpoints in the Google Cloud console, which perform signature-based threat detection on traffic from your virtual machine (VM) instances.\u003c/p\u003e\n"],["\u003cp\u003eYou can access a summary of network threats within a specified time period through the Cloud NGFW Dashboard.\u003c/p\u003e\n"],["\u003cp\u003eTo view threats, users need to navigate to the \u003cstrong\u003eThreats\u003c/strong\u003e page in the Google Cloud console and must have the required IAM permissions or roles within their organization.\u003c/p\u003e\n"],["\u003cp\u003eThe listed threats can be refined by applying filters such as severity, alert time, threat name, and threat type, allowing for a more focused analysis.\u003c/p\u003e\n"],["\u003cp\u003eYou can view audit logs for each specific threat detected by clicking "View audit log", and the cloud logging page will display the detail logs.\u003c/p\u003e\n"]]],[],null,["# View threats\n\nThis page explains how to view threats detected by the firewall endpoint for\nthe intercepted traffic by using the Google Cloud console.\n\nFirewall endpoints perform signature-based threat detection and prevention on\nthe intercepted traffic from your virtual machine (VM) instances.\nCloud Next Generation Firewall provides default\nthreat signatures, supported threat severity levels, and threat overrides that\nyou use to identify malicious activity and prevent network attacks.\nUse the **Threat** page to view threats detected in your network during a\nspecific timeframe.\n\nTo view a summary of the threats observed during a specific period in your\nnetwork, go to the Cloud NGFW [Dashboard](https://console.cloud.google.com/net-security/firewall-manager/dashboard/cards).\n\nTo learn more about threats, see [Threat signatures overview](/firewall/docs/about-threats).\n\nRoles and permissions\n---------------------\n\nTo get permissions that you need to view the threat page, ask your\nadministrator to grant you the necessary Identity and Access Management (IAM) roles on your\norganization. For more information about granting roles, see\n[Manage access](/iam/docs/granting-changing-revoking-access).\n\nView threats\n------------\n\n#### Permissions required for this task\n\nTo perform this task, you must have been granted the following permissions\n*or* one of the following IAM roles on your organization.\n\n**Permissions**\n\n- `networksecurity.securityProfiles.create`\n\n**Roles**\n\n- `compute.networkAdmin` \n\n### Console\n\n1. In the Google Cloud console, go to the **Threats** page.\n\n [Go to Threats](https://console.cloud.google.com/net-security/threats/list)\n2. If necessary, select your Google Cloud project.\n\n3. Select the timeframe for which you want to view the threats detected. You\n can select the duration from 1 hour to 30 days.\n Threats detected during the selected timeframe are displayed.\n\n4. Optional: To further refine the listed threats, select one or more of\n the following filters:\n\n - Severity\n - Alert time on\n - Alert time before\n - Alert time after\n - Threat name\n - Threat type\n5. To view logs for a specific threat, click **View audit log** next to the\n threat name.\n The Cloud Logging page appears that displays the detailed logs for\n the selected threat. To understand the threat log structure, see\n [Threat logs](/firewall/docs/threat_logs).\n\nWhat's next\n-----------\n\n- [Create and manage security profiles](/firewall/docs/configure-security-profiles)\n- [Create and manage security profile groups](/firewall/docs/configure-security-profile-groups)\n- [Create and manage firewall endpoints](/firewall/docs/configure-firewall-endpoints)\n- [Create and manage firewall endpoint associations](/firewall/docs/configure-firewall-endpoint-associations)"]]