Top Intrusion Hits Sources Drill-Down - ZyXEL Communications Vantage Report User Manual

User guide
Hide thumbs Also See for Vantage Report:
Table of Contents

Advertisement

Table 156 Report > E-Mail Security > Intrusion Hits > Top Sources
LABEL
Source
Color
Intrusions
% of Intrusions
View Logs
Total

8.3.6 Top Intrusion Hits Sources Drill-Down

Use this report to look at the top intrusion signatures for any top source.
Vantage Report User's Guide
DESCRIPTION
This field displays the top sources of intrusions in the selected device,
sorted by the number of intrusions by each one. If the number of
sources is less than the maximum number of records displayed in this
table, every source is displayed.
Each source is identified by its IP address. If DNS Reverse is enabled
in System > General Configuration, the table displays the domain
name, if identifiable, with the IP address (for example,
"www.yahoo.com/200.100.20.10").
Click on a source to look at the top intrusion signatures for the
selected source.
This field displays what color represents each source in the graph.
This field displays the number of intrusions by each source.
This field displays what percentage of all intrusions was made by each
source.
Click this icon to see the logs that go with the record.
This entry displays the totals for the sources above.
Chapter 8 E-Mail Security
371

Advertisement

Table of Contents
loading

This manual is also suitable for:

Vantage report 3.0Vantage report 2.3

Table of Contents