7.2.5 Top Attack Sources .................................................................................................. 283
7.2.7 Attack Types ............................................................................................................. 288
7.3 Intrusion Hits ...................................................................................................................... 291
7.4 Antivirus ............................................................................................................................. 315
7.4.1 Antivirus Summary ................................................................................................... 315
7.4.3 Top Viruses .............................................................................................................. 319
7.4.5 Top Virus Sources .................................................................................................... 323
E-Mail Security ...................................................................................................................... 333
8.1 Virus Found ....................................................................................................................... 333
8.1.3 Top Viruses .............................................................................................................. 337
8.1.5 Top Virus Sources .................................................................................................... 341
8.2 Spam ................................................................................................................................. 349
8.2.1 Spam Summary ........................................................................................................ 349
8.2.3 Top Spam Senders ................................................................................................... 353
8.2.4 Top Spam Sources ................................................................................................... 356
8.2.5 Spam Scores ............................................................................................................ 359
8.3 Intrusion Hits ...................................................................................................................... 361
Vantage Report User's Guide
Table of Contents
13