skip to content

Protect your business from cyber attacks with Comcast Threat Management Service™

Updated 9/15/2017 4:31:23 PM by Comcast Expert


Threat mitigation functionality is available as an add-on with Comcast Business Ethernet Dedicated Internet (EDI) services. Comcast Threat Management Service™ is a subscription-based offering that proactively detects Distributed Denial of Service (DDoS) attacks and alerts customers when an attack is under way, and enables the means to mitigate attacks.

If you have a Single-Incident or Multi-Incident Comcast Threat Management Service subscription, you will receive an email and/or SMS alert if a DDoS attack is under way and that you should call Comcast Security Assurance to begin mitigation to thwart the attack. If you have an Unlimited subscription, you will receive an email or SMS notification and mitigation will begin as soon as a detected DDoS attack begins.

During mitigation, Comcast Business diverts traffic directed at the customer's IPs, including DDoS attack traffic, to cloud-based scrubbing centers distributed across the United States. The resulting clean and legitimate traffic is simultaneously forwarded to the network and servers. Comcast Threat Management operates 24x7x365, and helps provide businesses with continued uptime while under a DDoS attack.

Monitor threats online

  1. Step 1:


    After signing in to your account, active DDoS alerts will display in a red banner at the top of the home page. Select View Threats.

    If there is no active threat, select Ethernet from the Manage Services menu to view threat records.

  2. Step 2:


    View the following information in the Threat Management section:

    • The number of Active High Severity Threats (if applicable)

    • The number of Mitigated Threats the service handled this month

    • The number of Mitigation Incidents Used in the span of a month

  3. Step 3:


    Select Details to see your EDI and subscription details.

  4. Step 4:

    To view threat records, scroll down to DDoS Threat Records.

  5. Step 5:

    Select Filters to expand your search options. You can search for threat records by entering data in the Search field, by entering a range of dates or by excluding records by severity. After setting your search criteria, select Update Results to see the records displayed according to your search parameters.

  6. Step 6:

    To see more details about a high severity threat, select the Expand icon to the right of the record.

  7. Step 7:

    You can also download a PDF, Excel or CSV file of your filtered results.

Was This Article Helpful?

Rate this article on a scale of 1-5

Didn't find what you're looking for?

Related Articles

» More about Business Ethernet Help and Support