Chapter 7 Network Security
Click on a specific destination in Report > Network Security > Intrusion Hits
> Top Destinations to open this screen.
Figure 142 Report > Network Security > Intrusion Hits > Top Destinations > Drill-
Down
Each field is described in the following table.
Table 128 Report > Network Security > Intrusion Hits > Top Destinations > Drill-
Down
LABEL
graph
Intrusion
Signature
Color
310
DESCRIPTION
The graph displays the information in the table visually.
•
Click the Pie View or the Bar View icon. You can specify the
Default Chart Type in System > General Configuration.
•
Move your mouse over a slice in the pie chart or a bar in the bar
chart to display its identification.
•
Click on a slice in the pie chart to move it away from the pie chart
a little.
This field displays the top intrusion signatures sent to the selected
destination, sorted by the number of intrusions at each one.
This field displays what color represents each intrusion signature in
the graph.
Vantage Report User's Guide