Chapter 7 Network Security
Click on a specific intrusion signature in Report > Network Security >
Intrusion Hits > Top Intrusions to open this screen.
Figure 138 Report > Network Security > Intrusion Hits > Top Intrusions > Drill-Down
300
Vantage Report User's Guide