Skip to content

Guide: UI Overview (User-Focused)

This page explains what you see in the app and what each area means for day-to-day protection.

If this is your first session, start with:

  1. Guide: Getting Started
  2. How-To: Certificate and Proxy Diagnostics

Quick Visual Map

Main dashboard overview
Overview top bar and status

1) Security Overview

Use this screen to answer one question quickly: am I protected and is traffic being inspected right now?

What to watch first:

  • Monitor and proxy status are active.
  • Total inspected requests keeps increasing.
  • Blocked requests are visible (ads, trackers, malicious pages).
  • Threat counters (phishing / secrets / suspicious patterns) are non-zero only when needed.

Detailed captures:

Overview metrics cards
Overview risk cards and status focus
Overview activity timeline
Overview tables and breakdowns
Overview domains table focus
Overview categories table focus

How to interpret it:

  • A high blocked count with low threat count is usually healthy filtering.
  • A sudden jump in threat count should be reviewed in Live Threats.
  • If counts freeze while browsing, monitor or proxy may be off.

2) Live Threats

Use this screen for active monitoring and incident triage.

Live threats main view
Live threats controls
Live threats counters
Live counters and stream status focus
Live alert stream
Live alert details panel
Live incident cards with threat context

What this page is for:

  • Confirm monitoring is active.
  • See new events in real time.
  • Open details for each event.
  • Decide whether to keep blocking or allowlist a domain.

3) Settings

Use Settings for stability and policy, not only one-time setup.

Settings screen
Settings sections
Certificate status section
Security toggles
Settings header and top context
Settings security cards and controls

4) Daily Operator Routine

  1. Open Overview and confirm counters are moving.
  2. Open Live Threats and review the latest alerts.
  3. Open Settings and run this checklist:
  4. verify certificate status,
  5. confirm phishing and security toggles are enabled,
  6. review filter update status,
  7. keep the allowlist strict and specific.
  8. Run update-all filters only when freshness checks require it.