Alert Trend (7 Days)
Severity Breakdown
Live Endpoints
0 online| Host | Status | CPU | RAM | Last Seen |
|---|
Recent Threats
| Severity | Title | Time |
|---|
🏢 New Client
⚠ Client name cannot be changed after creation.
Devices
Recent Alerts
| Severity | Title | Device | Time |
|---|
Security Scans
Recent Events
| Level | Category | Message | Time |
|---|
| Hostname | OS | IP | Client | CPU | RAM | Disk | Risk Score | Status | Last Seen | Actions |
|---|---|---|---|---|---|---|---|---|---|---|
🔑 Agent Registration Token
Paste into agent config.ini. Keep this secret.
CPU %
RAM %
Disk %
Processes
| Process | PID | CPU % | RAM MB | User | Action |
|---|---|---|---|---|---|
| Select a device | |||||
| Application | Version | Publisher | Installed |
|---|---|---|---|
| Select a device | |||
| Severity | MITRE | Category | Title | Device | Status | Created | Actions |
|---|---|---|---|---|---|---|---|
➕ Create Alert
CIS Controls
Agent Coverage
Vulnerability Summary
| Process | Local Address | Remote IP | Port | Status |
|---|---|---|---|---|
| Select a device | ||||
| Update Title | Severity | Status |
|---|---|---|
| Select a device | ||
Screen Feed
InactiveQuick Actions
Session Info
Command Console
| Command | Status | Time | Output |
|---|
📋 New Policy
Custom Deployment
Quick Deploy Packages
| User | Role | Auth Method | Last Login | Status | Actions | |
|---|---|---|---|---|---|---|
👤 Add Staff Member
✏️ Edit Staff Member
📋 Activity Log —
| Time | Action | Resource | Detail |
|---|
🚫 Suspend Account
The user will be immediately logged out and cannot sign in until reactivated.
☁ Azure AD / Microsoft SSO Setup
2. Click + New Registration → Name: "Phantom AI"
3. Redirect URI:
Loading...4. Click Register → copy the Application (client) ID
5. Go to Certificates & Secrets → New client secret → copy value
6. Add to Railway Variables:
AZURE_CLIENT_ID = {your app id}
AZURE_CLIENT_SECRET = {your secret}
AZURE_TENANT_ID = {your tenant id}
AZURE_REDIRECT_URI = {the redirect URI above}
| Time | User | Action | Resource | Detail | IP |
|---|---|---|---|---|---|
⚡ Apply Patch
🚀 Quick Commands
📋 Patch History
Filter Rules
Quick Block
| Rule Name | Direction | Action | Protocol | Remote IP | Port | Scope | Status | Actions |
|---|---|---|---|---|---|---|---|---|
🔒 New Firewall Rule
📊 DNS Stats
🔍 Recent Queries
| Domain | Blocked | Count | Last Seen |
|---|---|---|---|
| Select a device | |||
Blocked Domains
| Domain | Category | Source | Client | Added | Actions |
|---|---|---|---|---|---|
🚫 Block Domain
⬇ Import Public Threat Feed
Import thousands of known malicious domains from public threat intelligence feeds.
⚠ This may import up to 5,000 domains. Import may take 30-60 seconds.
Top Processes by Data Received
Top Processes by Data Sent
| Process | Data Received | Data Sent | Last Active |
|---|---|---|---|
| Select a device to view bandwidth usage | |||
ℹ How Scheduling Works
| Policy | Type | Schedule | Next Run | Last Run | Status | Actions |
|---|---|---|---|---|---|---|
🕐 Schedule a Policy
How It Works
Any IP address added here will be monitored across all devices. When an agent detects an active connection to a listed IP, it immediately raises a Critical alert and logs the event. The agent checks connections during every security scan (every 5 minutes).
| IP Address | Description | Severity | Added By | Date Added | Actions |
|---|---|---|---|---|---|
🚨 Add Threat IP
📄 Generate PDF Report
✅ All open threats with severity
✅ Missing Windows updates
✅ Network threats detected
✅ Resolved alerts this week
✅ Executive summary stats
📧 Email Report
SMTP_PORT = 587
SMTP_USER = your@gmail.com
SMTP_PASS = your-app-password
SMTP_FROM = reports@phantomsecurity.online
📅 Scheduled Reports
🔗 Client Install Link
Send this to your client — they click, download, run. Done.📋 What the Client Receives
🔑 Registration Token
⚙️ config.ini — Pre-configured (URL + token + client ID)
🩺 doctor.bat — Installs everything as admin
🔄 watchdog.ps1 — Keeps agent running after crashes
What is MITRE ATT&CK?
MITRE ATT&CK is a globally recognised framework that maps adversary tactics and techniques observed in real-world attacks. Every alert in Phantom AI is automatically tagged with the relevant technique ID so you can identify attack patterns and report accurately to clients.
Techniques Detected
Tactics Breakdown
All Tagged Alerts
| Technique ID | Tactic | Technique | Total | Open |
|---|---|---|---|---|
Behavior Events
| Time | Process | Score | MITRE | Tactic |
|---|---|---|---|---|
| Select a device | ||||
How Scoring Works
Devices by Risk Level
Endpoint Isolation Control
Instantly cut a compromised device off from the network. The device can only reach the Phantom AI server — everything else is blocked at the Windows Firewall level.
All Devices — Risk Ranking
| Hostname | Risk Score | Risk Level | Behavior Score | Open Alerts | Missing Patches | Isolated | Actions |
|---|---|---|---|---|---|---|---|
Query Builder
Saved Queries
Available Tables
Results
| Run a query to see results |
|---|
Sites represent physical locations under a client — office branches, data centres, remote sites. Each device can be assigned to a site for organised management.