ZyXEL Communications Vantage Report User Manual page 14

User guide
Hide thumbs Also See for Vantage Report:
Table of Contents

Advertisement

Table of Contents
8.3.1 Intrusion Hits Summary ............................................................................................ 361
8.3.2 Intrusion Hits Summary Drill-Down .......................................................................... 363
8.3.3 Top Intrusion Hits Signatures ................................................................................... 365
8.3.4 Top Intrusion Hits Signatures Drill-Down .................................................................. 367
8.3.5 Top Intrusion Hits Sources ....................................................................................... 368
8.3.6 Top Intrusion Hits Sources Drill-Down ...................................................................... 371
8.3.7 Top Intrusion Hits Destinations ................................................................................. 373
8.3.8 Top Intrusion Hits Destinations Drill-Down ............................................................... 376
8.3.9 Intrusion Hits Severities .......................................................................................... 378
8.3.10 Intrusion Hits Severities Drill-Down ........................................................................ 380
Web Security ......................................................................................................................... 383
9.1 Security Threat .................................................................................................................. 383
9.1.1 Security Threat Summary ........................................................................................ 383
9.1.2 Security Threat Summary Drill-Down ....................................................................... 385
9.1.3 Security Threat Top Web Sites ................................................................................. 387
9.1.4 Security Threat Top Sites Drill-Down ....................................................................... 390
9.1.5 Security Threat Top Users ........................................................................................ 391
9.1.6 Security Threat Top Users Drill-Down ...................................................................... 394
9.1.7 Security Threat Top Hosts ........................................................................................ 395
9.1.8 Security Threat Top Hosts Drill-Down ...................................................................... 398
9.1.9 Security Threat Categories ...................................................................................... 399
9.1.10 Security Threat Categories Drill-Down ................................................................... 401
9.2 Virus Found ....................................................................................................................... 403
9.2.1 Virus Found Summary ............................................................................................. 403
9.2.2 Virus Found Summary Drill-Down ............................................................................ 406
9.2.3 Top Viruses .............................................................................................................. 407
9.2.4 Top Viruses Drill-Down ............................................................................................. 409
9.2.5 Top Virus Sources .................................................................................................... 410
9.2.6 Top Virus Sources Drill-Down ................................................................................. 413
9.2.7 Top Virus Destinations ............................................................................................. 414
9.2.8 Top Virus Destinations Drill-Down ............................................................................ 417
9.3 Intrusion Hits ...................................................................................................................... 418
9.3.1 Intrusion Hits Summary ............................................................................................ 418
9.3.2 Intrusion Hits Summary Drill-Down .......................................................................... 421
9.3.3 Top Intrusion Hits Signatures ................................................................................... 423
9.3.4 Top Intrusion Hits Signatures Drill-Down .................................................................. 426
9.3.5 Top Intrusion Hits Sources ....................................................................................... 428
9.3.6 Top Intrusion Hits Sources Drill-Down ...................................................................... 431
9.3.7 Top Intrusion Hits Destinations ................................................................................. 433
9.3.8 Top Intrusion Hits Destinations Drill-Down ............................................................... 436
9.3.9 Intrusion Hits Severities .......................................................................................... 438
14
Vantage Report User's Guide

Advertisement

Table of Contents
loading

This manual is also suitable for:

Vantage report 3.0Vantage report 2.3

Table of Contents