Chapter 9 Web Security
9.1.8 Security Threat Top Hosts Drill-Down
Use this report to look at the top destinations for any top source of blocked web
traffic.
Click on a specific source in Report > Web Security > Security Threat > Top
Hosts to open this screen.
Figure 184 Report > Web Security > Security Threat > Top Hosts > Drill-Down
Each field is described in the following table.
Table 169 Report > Web Security > Security Threat > Top Hosts > Drill-Down
LABEL
title
Report Type
graph
398
DESCRIPTION
This field displays the title of the drill-down report. The title includes
the date(s) you specified in the Last Days or Settings fields.
Specify Top Categories, Top Sites or By Hour as the content to be
displayed.
The graph displays the information in the table visually.
•
Click the Pie View or the Bar View icon. You can specify the
Default Chart Type in System > General Configuration.
•
Move your mouse over a slice in the pie chart or a bar in the bar
chart to display its identification.
•
Click on a slice in the pie chart to move it away from the pie chart
a little.
Vantage Report User's Guide