Vantage Report User's Guide
4.5 Anti-Virus Monitor ...............................................................................................48
4.6 Anti-Spam Monitor ..............................................................................................49
Traffic ...................................................................................................................... 52
5.1 Bandwidth ..........................................................................................................52
5.2 Web Traffic .........................................................................................................63
5.3 FTP Traffic ..........................................................................................................70
5.4 Mail Traffic ..........................................................................................................77
5.5 VPN Traffic .........................................................................................................84
5.6 Other Traffic .......................................................................................................92
Network Attack ..................................................................................................... 102
6.1 Attack ...............................................................................................................102
7
5.2.1 Top Web Sites............................................................................................63
5.2.3 Top Web Hosts ..........................................................................................67
5.3.1 Top FTP Sites ............................................................................................70
5.3.3 Top FTP Hosts ...........................................................................................74
5.4.1 Top Mail Sites ............................................................................................77
5.4.3 Top Mail Hosts ...........................................................................................81
5.5.3 Top VPN Hosts ..........................................................................................88
5.6.1 Service Settings.........................................................................................92
6.1.1 Attack Summary ......................................................................................102
Table of Contents