ZyXEL Communications Vantage Report User Manual page 379

User guide
Hide thumbs Also See for Vantage Report:
Table of Contents

Advertisement

Each field is described in the following table.
Table 160 Report > E-Mail Security > Intrusion Hits > By Severity
LABEL
Last ... Days
Settings
graph
Severity
Color
Intrusions
% of Intrusions
View Logs
Total
Vantage Report User's Guide
DESCRIPTION
Use this field or Settings to specify what historical information is
included in the report. Select how many days, ending (and including)
today, you want to include.
When you change this field, the report updates automatically. You can
see the current date range in the title.
This field resets to its default value when you click a menu item in the
menu panel (including the menu item for the same report). It does
not reset when you open or close drill-down reports.
Use these fields to specify what historical information is included in
the report. Click the settings icon. The Report Display Settings
screen appears.
Select a specific Start Date and End Date. The date range can be up
to 30 days long, but you cannot include days that are older than
Store Log Days in System > General Configuration. Click Apply
to update the report immediately, or click Cancel to close this screen
without any changes.
The graph displays the information in the table visually.
Click the Pie View or the Bar View icon. You can specify the
Default Chart Type in System > General Configuration.
Move your mouse over a slice in the pie chart or a bar in the bar
chart to display its identification.
Click on a slice in the pie chart to move it away from the pie chart
a little.
This field displays the severity of intrusions in the selected device,
sorted by the number of intrusions of each level.
Click on a severity to look at the intrusion signatures for the selected
severity.
This field displays what color represents each level of severity in the
graph.
This field displays the number of intrusions of each level of severity.
This field displays what percentage of all intrusions are at each level
of severity.
Click this icon to see the logs that go with the record.
This entry displays the totals for the severities above.
Chapter 8 E-Mail Security
379

Advertisement

Table of Contents
loading

This manual is also suitable for:

Vantage report 3.0Vantage report 2.3

Table of Contents