Monitor (Runtime application self-protection)
What types of threats does Monitor detect?
Monitor detects multiple types of security threats, including:
✔ Reverse engineering attempts (debuggers, memory dumping, hooking)
✔ Tampering & unauthorized modifications (patching, memory manipulation)
✔ Malware & cheat tools (Frida, Xposed, GameGuardian)
✔ Environment risks (rooted/jailbroken devices, emulators, sandboxes)
✔ Network threats (traffic sniffing, man-in-the-middle attacks)
✔ Unauthorized device usage (cloned devices, unauthorized environments)
How does Monitor analyze and identify security risks?
Monitor works as a RASP (Runtime Application Self-Protection) solution, continuously analyzing your application in real time. It detects anomalies by:
✔ Monitoring code integrity and runtime modifications
✔ Checking device security status (root, emulation, tampering)
✔ Identifying malicious behavior (memory injection, unauthorized debugging)
✔ Logging and analyzing security events via the ByteHide dashboard
Can I receive real-time alerts for security threats?
Yes! Monitor provides real-time alerts through:
✔ Email notifications for critical threats
✔ Dashboard alerts for detected incidents
✔ Custom webhook integrations for SIEM/SOC tools
✔ Automated actions (e.g., terminate app, wipe data, lock access)
How do I configure security policies in Monitor?
You can customize Monitor’s security policies in the ByteHide dashboard:
- Go to "Monitor" in the dashboard.
- Navigate to by the workflows tab.
- Select which threats you want to detect (debuggers, root, tampering, etc.).
- Choose the reaction (alert, block, terminate app, delete data).
- Save your configuration and deploy it to your applications.
What actions does Monitor take when a threat is detected?
Monitor provides automated threat responses, including:
✔ Logging & reporting security incidents
✔ Sending real-time alerts to admins/developers
✔ Blocking unauthorized access to the app
✔ Force-closing the application
✔ Wiping app data to prevent further attacks
✔ Blocking the device permanently from using the app
How do I integrate Monitor with my existing security tools?
Monitor integrates with existing security tools via:
✔ API access for fetching security logs and events
✔ Webhook support for SIEM and SOC platforms
✔ Integration with Shield & Secrets for enhanced protection
✔ Custom event logging for forensic analysis
Can I customize the security rules applied by Monitor?
Yes! Monitor allows full customization of security rules:
✔ Choose which threats to detect (root, hooking, tampering, etc.)
✔ Define custom response actions (alerts, app termination, data wiping)
✔ Adjust security sensitivity based on your risk tolerance
✔ Create environment-specific rules for different app versions
Updated on: 05/03/2025
Thank you!