ZyXEL Communications Vantage Report User Manual page 13

User guide
Hide thumbs Also See for Vantage Report:
Table of Contents

Advertisement

7.2.5 Top Attack Sources .................................................................................................. 283
7.2.6 Top Attack Sources Drill-Down ................................................................................. 286
7.2.7 Attack Types ............................................................................................................. 288
7.2.8 Attack Types Drill-Down ........................................................................................... 290
7.3 Intrusion Hits ...................................................................................................................... 291
7.3.1 Intrusion Hits Summary ............................................................................................ 291
7.3.2 Intrusion Hits Summary Drill-Down .......................................................................... 294
7.3.3 Top Intrusion Hits Signatures ................................................................................... 296
7.3.4 Top Intrusion Hits Signatures Drill-Down .................................................................. 299
7.3.5 Top Intrusion Hits Sources ....................................................................................... 301
7.3.6 Top Intrusion Hits Sources Drill-Down ...................................................................... 304
7.3.7 Top Intrusion Hits Destinations ................................................................................. 306
7.3.8 Top Intrusion Hits Destinations Drill-Down ............................................................... 309
7.3.9 Intrusion Hits Severities ...........................................................................................311
7.3.10 Intrusion Hits Severities Drill-Down ........................................................................ 314
7.4 Antivirus ............................................................................................................................. 315
7.4.1 Antivirus Summary ................................................................................................... 315
7.4.2 Virus Summary Drill-Down ....................................................................................... 318
7.4.3 Top Viruses .............................................................................................................. 319
7.4.4 Top Viruses Drill-Down ............................................................................................. 322
7.4.5 Top Virus Sources .................................................................................................... 323
7.4.6 Top Virus Sources Drill-Down ................................................................................. 326
7.4.7 Top Virus Destinations ............................................................................................. 328
7.4.8 Top Virus Destinations Drill-Down ............................................................................ 330
E-Mail Security ...................................................................................................................... 333
8.1 Virus Found ....................................................................................................................... 333
8.1.1 Virus Found Summary ............................................................................................. 333
8.1.2 Virus Found Summary Drill-Down ............................................................................ 336
8.1.3 Top Viruses .............................................................................................................. 337
8.1.4 Top Viruses Drill-Down ............................................................................................. 340
8.1.5 Top Virus Sources .................................................................................................... 341
8.1.6 Top Virus Sources Drill-Down ................................................................................. 344
8.1.7 Top Virus Destinations ............................................................................................. 346
8.1.8 Top Virus Destinations Drill-Down ............................................................................ 348
8.2 Spam ................................................................................................................................. 349
8.2.1 Spam Summary ........................................................................................................ 349
8.2.2 Spam Summary Drill-Down ...................................................................................... 352
8.2.3 Top Spam Senders ................................................................................................... 353
8.2.4 Top Spam Sources ................................................................................................... 356
8.2.5 Spam Scores ............................................................................................................ 359
8.3 Intrusion Hits ...................................................................................................................... 361
Vantage Report User's Guide
Table of Contents
13

Advertisement

Table of Contents
loading

This manual is also suitable for:

Vantage report 3.0Vantage report 2.3

Table of Contents