Protect your business from cyber attacks with Comcast Threat Management Service™

Updated 7/26/2018 6:15:32 PM by Comcast Expert


Threat mitigation functionality is available as an add-on with Comcast Business Ethernet Dedicated Internet (EDI) services. Comcast Threat Management Service™ is a subscription-based offering that proactively detects Distributed Denial of Service (DDoS) attacks and alerts customers when an attack is under way, and enables the means to mitigate attacks.

If you have a Single-Incident Comcast Threat Management Service subscription, you will receive an email and/or SMS alert if a DDoS attack is under way and that you should call Comcast Security Assurance to begin mitigation to thwart the attack. If you have an Unlimited subscription, you will receive an email or SMS notification and mitigation will begin as soon as a detected DDoS attack begins.

During mitigation, Comcast Business diverts traffic directed at the customer's IPs, including DDoS attack traffic, to cloud-based scrubbing centers distributed across the United States. The resulting clean and legitimate traffic is simultaneously forwarded to the network and servers. Comcast Threat Management operates 24x7x365, and helps provide businesses with continued uptime while under a DDoS attack.

Monitor threats online

  1. Sign in to My Account, and select View Threats from the active DDoS alerts in the red banner. If there is no active threat, select Ethernet from the Services menu.

  2. View the following information in the Threat Management section:

    • The number of Active High Severity Threats (if applicable)

    • The number of Mitigated Threats the service handled this month

    • The number of Mitigation Incidents Used in the span of a month


  3. Select Details to see your EDI and subscription details.

  4. View DDoS Threat Records.

  5. Select Filters to expand search options. Search for threat records by entering data in the Search field, by entering a range of dates or by excluding records by severity. Select Update Results.

  6. Select the Expand icon to view more details about a high severity threat record.

  7. Download a PDF, Excel or CSV file of your filtered results.

Was This Article Helpful?

Rate this article on a scale of 1-5

Didn't find what you're looking for?

Related Articles

» More about Business Ethernet