ZyXEL Communications Vantage Report User Manual page 372

User guide
Hide thumbs Also See for Vantage Report:
Table of Contents

Advertisement

Chapter 8 E-Mail Security
Click on a specific source in Report > E-Mail Security > Intrusion Hits > Top
Sources to open this screen.
Figure 172 Report > E-Mail Security > Intrusion Hits > Top Sources > Drill-Down
Each field is described in the following table.
Table 157 Report > E-Mail Security > Intrusion Hits > Top Sources > Drill-Down
LABEL
graph
Intrusion
Signature
Color
Severity
Type
Intrusions
372
DESCRIPTION
The graph displays the information in the table visually.
Click the Pie View or the Bar View icon. You can specify the
Default Chart Type in System > General Configuration.
Move your mouse over a slice in the pie chart or a bar in the bar
chart to display its identification.
Click on a slice in the pie chart to move it away from the pie chart
a little.
This field displays the top intrusion signatures from the selected
source, sorted by the number of intrusions by each one.
This field displays what color represents each intrusion signature in
the graph.
This field displays the severity of each intrusion signature.
This field displays what kind of intrusion each intrusion signature is.
This corresponds to IDP > Signature > Attack Type in most ZyXEL
devices.
This field displays the number of intrusions by the selected source
using each intrusion signature.
Vantage Report User's Guide

Advertisement

Table of Contents
loading

This manual is also suitable for:

Vantage report 3.0Vantage report 2.3

Table of Contents