ZyXEL Communications VANTAGE REPORT - VERSION 2.3 User Manual page 9

Hide thumbs Also See for VANTAGE REPORT - VERSION 2.3:
Table of Contents

Advertisement

6.2 Intrusion ...........................................................................................................113
6.3 AntiVirus ...........................................................................................................133
6.4 AntiSpam ..........................................................................................................147
Security Policy ..................................................................................................... 158
7.1 Blocked Web Accesses ....................................................................................158
7.2 Allowed Web Accesses ....................................................................................172
Table of Contents
6.1.2 Attack Summary Drill-Down.....................................................................104
6.1.3 Top Attack Sources..................................................................................106
6.1.4 Top Attack Sources Drill-Down ................................................................107
6.1.5 Top Attack Categories..............................................................................109
6.1.6 Top Attack Categories Drill-Down ............................................................ 111
6.2.1 Intrusion Summary...................................................................................113
6.2.2 Intrusion Summary Drill-Down .................................................................115
6.2.3 Top Intrusion Signatures ..........................................................................117
6.2.4 Top Intrusion Signatures Drill-Down ........................................................119
6.2.5 Top Intrusion Sources ..............................................................................121
6.2.6 Top Intrusion Sources Drill-Down ............................................................123
6.2.7 Top Intrusion Destinations .......................................................................125
6.2.8 Top Intrusion Destinations Drill-Down......................................................127
6.2.9 Intrusion Severities ..................................................................................129
6.2.10 Intrusion Severities Drill-Down...............................................................131
6.3.1 Virus Summary ........................................................................................133
6.3.2 Virus Summary Drill-Down.......................................................................135
6.3.3 Top Viruses ..............................................................................................137
6.3.4 Top Viruses Drill-Down ............................................................................139
6.3.5 Top Virus Sources....................................................................................141
6.3.6 Top Virus Sources Drill-Down ..................................................................143
6.3.7 Top Virus Destinations .............................................................................145
6.4.1 Spam Summary .......................................................................................147
6.4.2 Spam Summary Drill-Down......................................................................149
6.4.3 Top Spam Senders ..................................................................................151
6.4.4 Top Spam Sources...................................................................................153
6.4.5 Top Spam Scores.....................................................................................155
7.1.1 Web Block Summary ...............................................................................158
7.1.2 Web Block Summary Drill-Down..............................................................160
7.1.3 Top Blocked Web Sites............................................................................162
7.1.4 Top Blocked Web Sites Drill-Down ..........................................................163
7.1.5 Top Blocked Web Hosts...........................................................................165
7.1.6 Top Blocked Web Hosts Drill-Down .........................................................167
7.1.7 Top Blocked Web Categories ..................................................................169
7.1.8 Top Blocked Web Categories Drill-Down.................................................170
Vantage Report User's Guide
8

Advertisement

Table of Contents
loading

This manual is also suitable for:

Vrpt 2.3Vantage report

Table of Contents