8.3.2 Intrusion Hits Summary Drill-Down
Use this report to look at the intrusion signatures in a specific time interval.
Click on a specific time interval in Report > E-Mail Security > Intrusion Hits >
Summary to open this screen.
Figure 167 Report > E-Mail Security > Intrusion Hits > Summary > Drill-Down
Each field is described in the following table.
Table 153 Report > E-Mail Security > Intrusion Hits > Summary > Drill-Down
LABEL
graph
Intrusion
Signature
Vantage Report User's Guide
DESCRIPTION
The graph displays the information in the table visually.
•
Click the Pie View or the Bar View icon. You can specify the
Default Chart Type in System > General Configuration.
•
Move your mouse over a slice in the pie chart or a bar in the bar
chart to display its identification.
•
Click on a slice in the pie chart to move it away from the pie chart
a little.
This field displays the categories of intrusions in the selected time
interval, sorted by the number of attempts by each one.
Clicking on the entries in this column will open a new window with a
description of this security issue (see
Chapter 8 E-Mail Security
Figure 168 on page
364).
363