Table of Contents
6.4 Xauth ................................................................................................................................. 265
Network Security................................................................................................................... 269
7.1.1 Top Users Blocked ................................................................................................... 269
7.1.2 Top Packets Blocked ................................................................................................ 272
7.2 Attack ................................................................................................................................. 275
7.2.1 Attack Summary ....................................................................................................... 275
7.2.3 Top Attacks ............................................................................................................... 279
12
Vantage Report User's Guide