LogoThreatmatic

Console Overview

A guide to the Threatmatic Console — your central control plane for network security.

The Threatmatic Console is the authenticated management interface for your organization's network security posture. It provides centralized control over devices, policies, zones, and metrics across your infrastructure.

The console is organized into the following sections, accessible from the sidebar:

Access & Authentication

All console pages require an active authenticated session. Unauthenticated requests are automatically redirected to the login page.

Organization required

Every authenticated user must belong to an active organization. Pages that load organization-scoped data will throw if no activeOrganizationId is present on the session.

Route Structure

PathDescription
/dashboardStats overview
/devicesDevice list
/devices/[id]Device detail
/policiesPolicy list
/policies/[id]Policy detail
/zonesZone list
/zones/[id]Zone detail
/metricsMetrics grid
/metrics/allowAllow traffic metrics
/metrics/denyDeny traffic metrics
/networkNetwork workflow canvas
/connected-devicesLive connected device status
/settings/*User settings
/organization/*Organization management
/admin/*Admin panel (admin role only)
/account/*Account management
/help-centerHelp resources

How is this guide?

Last updated on

On this page