Threats dashboard sample data
If you would like to see examples of the types of data that can appear on the Threats dashboard without generating potentially dangerous network traffic, you can import sample data.
Because the sample data is loaded into the Log Database, where it is mixed with any real data generated in your network, it is best to load the sample data only in a test or evaluation environment.
To clearly flag the sample data, each of the users in the sample database is assigned the middle name Demo (for example, Sam Demo Smith and Lisa Demo Brady). In addition, the timestamp on the user activity predates the creation of the Log Database partition holding the data. Note that the sample data is intended for import soon after installing the product. If too much time has elapsed since the installation, a message displays, advising that the data has expired and cannot be loaded.
To load sample data into the database, click Sample Data, then click Import Sample Data. When you click OK and Save and Deploy, the data is loaded into the Log Database. After a few seconds, the Threats dashboard is updated to show the new data.