diff --git a/main/docs/images/cdy7uua7fh8z/1Kd9d33WUCdlVa1SwEFkKQ/496722ce86bc00cc7f58d1e04e1fd006/MFA_success_rate_threshold_editor_-_english.png b/main/docs/images/cdy7uua7fh8z/1Kd9d33WUCdlVa1SwEFkKQ/496722ce86bc00cc7f58d1e04e1fd006/MFA_success_rate_threshold_editor_-_english.png
index 2ce93d520..c20841b0f 100644
Binary files a/main/docs/images/cdy7uua7fh8z/1Kd9d33WUCdlVa1SwEFkKQ/496722ce86bc00cc7f58d1e04e1fd006/MFA_success_rate_threshold_editor_-_english.png and b/main/docs/images/cdy7uua7fh8z/1Kd9d33WUCdlVa1SwEFkKQ/496722ce86bc00cc7f58d1e04e1fd006/MFA_success_rate_threshold_editor_-_english.png differ
diff --git a/main/docs/images/cdy7uua7fh8z/2hyZMfdrGwVZxKtuV4ZOR3/f1795066d12eb02550da8f4eb0f00fd5/Threat_Behavior.png b/main/docs/images/cdy7uua7fh8z/2hyZMfdrGwVZxKtuV4ZOR3/f1795066d12eb02550da8f4eb0f00fd5/Threat_Behavior.png
index 6bc522763..c730e2a2c 100644
Binary files a/main/docs/images/cdy7uua7fh8z/2hyZMfdrGwVZxKtuV4ZOR3/f1795066d12eb02550da8f4eb0f00fd5/Threat_Behavior.png and b/main/docs/images/cdy7uua7fh8z/2hyZMfdrGwVZxKtuV4ZOR3/f1795066d12eb02550da8f4eb0f00fd5/Threat_Behavior.png differ
diff --git a/main/docs/images/cdy7uua7fh8z/6ywLqRG3zUAMwkAEGDoDoU/c24aa46d823ae702861ef57ee14dd9e6/Authentication.png b/main/docs/images/cdy7uua7fh8z/6ywLqRG3zUAMwkAEGDoDoU/c24aa46d823ae702861ef57ee14dd9e6/Authentication.png
index e309f14aa..3b296d4fd 100644
Binary files a/main/docs/images/cdy7uua7fh8z/6ywLqRG3zUAMwkAEGDoDoU/c24aa46d823ae702861ef57ee14dd9e6/Authentication.png and b/main/docs/images/cdy7uua7fh8z/6ywLqRG3zUAMwkAEGDoDoU/c24aa46d823ae702861ef57ee14dd9e6/Authentication.png differ
diff --git a/main/docs/images/cdy7uua7fh8z/Threat_Monitoring/Threat_Monitoring.png b/main/docs/images/cdy7uua7fh8z/Threat_Monitoring/Threat_Monitoring.png
new file mode 100644
index 000000000..3aeece2de
Binary files /dev/null and b/main/docs/images/cdy7uua7fh8z/Threat_Monitoring/Threat_Monitoring.png differ
diff --git a/main/docs/secure/security-center.mdx b/main/docs/secure/security-center.mdx
index 9030108b5..e56ccb3da 100644
--- a/main/docs/secure/security-center.mdx
+++ b/main/docs/secure/security-center.mdx
@@ -10,7 +10,7 @@ title: Security Center
'twitter:description': Learn about Security Center, which provides observability tools
that empower you to see potential attack trends and quickly respond to them in real-time.
'twitter:title': Security Center
----
+---
Security Center provides observability tools that allow you to see potential attack trends and quickly respond to them in real-time. Security Center provides real-time monitoring that allows you to observe your own Customer Identity and Access Management (CIAM) anomaly detection metrics, and lets you configure attack mitigation features from within the same space.
## Real-time monitoring
@@ -27,13 +27,11 @@ Security Center provides you with an overview of your tenant’s security pulse
Security Center allows you to filter available data to your needs.
-You can filter data based on a time period, including:
+You can filter data based on the following fields:
-* Last hour
-* Last 12 hours
-* Last day
-* Last 7 days
-* Last 14 days
+* Time period (up to the last 14 days)
+* Applications
+* Connections
Depending on the time period you select, the data is automatically aggregated per minute, per hour, or per day.
@@ -73,46 +71,38 @@ We will identify patterns that are usually an indicator of known attack types an
+
+
#### Bot detection
Bot detection mitigates scripted attacks by detecting when a request is likely to be coming from a bot. Bot detection includes the number of bots detected over the last seven days.
-
-
To learn more about this feature, read [Bot Detection](/docs/secure/attack-protection/bot-detection).
#### Suspicious IP throttling
Suspicious IP throttling blocks traffic from any IP address that rapidly attempts too many logins or signups. Suspicious IP throttling includes the number of suspicious IPs blocked over the last seven days.
-
-
To learn more about this feature, read [Suspicious IP Throttling](/docs/secure/attack-protection/suspicious-ip-throttling).
#### Brute-force protection
Brute-force protection safeguards against a single IP address attacking a single user account. Brute-force protection includes the number of blocked brute-force attempts over the last seven days.
-
-
To learn more about this feature, read [Brute-Force Protection](/docs/secure/attack-protection/brute-force-protection).
#### Breached password detection
Breached password detection protects your applications from bad actors signing up or logging in with stolen credentials. Breached password detection includes the number of breached credentials detected in login and signup flows over the last seven days.
-
-
To learn more about this feature, read [Breached Password Detection](/docs/secure/attack-protection/breached-password-detection).
#### Multi-factor authentication
Multi-factor authentication (MFA) verifies users by requiring more than one type of user validation. MFA includes the number of MFA challenges detected and the number of MFA challenges passed or failed over the last seven days.
-
-
To learn more about this feature, read [Multi-Factor Authentication](/docs/secure/multi-factor-authentication).
## Learn more
-* [Metrics](/docs/secure/security-center/metrics)
\ No newline at end of file
+* [Metrics](/docs/secure/security-center/metrics)
diff --git a/main/docs/secure/security-center/metrics.mdx b/main/docs/secure/security-center/metrics.mdx
index fd778a1cc..8a31422eb 100644
--- a/main/docs/secure/security-center/metrics.mdx
+++ b/main/docs/secure/security-center/metrics.mdx
@@ -10,7 +10,7 @@ title: Metrics
that are usually an indicator of known attack types.
'twitter:title': Metrics
---
-Security Center uses tenant log events to identify patterns that are usually an indicator of known attack types. We classify tenant log event patterns into categories: normal traffic, credential stuffing threats, signup attack threats, and MFA bypass threats.
+Security Center uses tenant log events to identify patterns that are usually an indicator of known attack types. We classify tenant log event patterns into categories: credential stuffing threats, signup attack threats, and MFA bypass threats.
@@ -18,48 +18,6 @@ Classification of event type codes may change. Avoid implementing solutions depe
-## Normal traffic
-
-We use normal traffic to establish a benchmark against different threat types we may observe. Normal traffic includes all successful and failed events for a given hour, which includes the following event codes:
-
-
-
-| Event code |
-Event |
-
-
-
-
-s |
-Successful login |
-
-
-ss |
-Successful signup |
-
-
-sepft |
-Successful exchange of password for access token |
-
-
-f |
-Failed user login |
-
-
-fu |
-Failed user login due to invalid username |
-
-
-fp |
-Failed user login due to invalid password |
-
-
-pwd_leak |
-Attempted login with a leaked password |
-
-
-
-
## Credential stuffing
We identify credential stuffing threats within a single hour with the following event codes:
@@ -172,4 +130,4 @@ We identify MFA bypass threats within a single hour with the following event cod
WebAuthn browser failure |
-
\ No newline at end of file
+
diff --git a/main/docs/secure/security-center/security-alerts.mdx b/main/docs/secure/security-center/security-alerts.mdx
index 43a586002..82f3b98f8 100644
--- a/main/docs/secure/security-center/security-alerts.mdx
+++ b/main/docs/secure/security-center/security-alerts.mdx
@@ -38,6 +38,12 @@ title: Configure Security Monitoring Alerts
Thresholds are calculated on a weighted moving average for a given metric and are customizable in your Auth0 Dashboard. Each defined threshold is viewable on your threat monitor metric charts and aggregated on an hourly basis; if no recovery threshold is configured, the recovery default to just below the set warning or alert threshold.
+
+
+Thresholds apply to the original metric without filters. When filters are applied, the original threshold and filtered trend lines are visible.
+
+
+

1. Go to [**Security > Security Center > Threat Monitoring**](https://manage.auth0.com/#/security/center/bot-detection) and choose a metric chart.
@@ -57,8 +63,6 @@ Thresholds are calculated on a weighted moving average for a given metric and ar
Thresholds can also be updated or removed in the expand view screen. Different thresholds on the same chart are behind the Threshold label carrot at the top right.
-
-
#### Manage notification destinations
Notification destinations are endpoints to which alert, warning, and recovery notices are delivered. Each tenant is limited to two destination endpoints, and a third-party webhook editor is recommended to personalize the notification's message.