ZyXEL Communications Vantage Report User Manual page 49

User guide
Hide thumbs Also See for Vantage Report:
Table of Contents

Advertisement

Table 10 Menu Panel
LEVEL 1/2
LEVEL 3
By Category
Virus Found
Summary
Top Viruses
Top Sources
Top
Destination
Intrusion Hits
Summary
Top
Intrusions
Top Sources
Top
Destinations
By Severity
Security
Policy
Enforcement
EPS
EPS
Content
Filter(All)
Vantage Report User's Guide
FUNCTION
Use this report to look at the top categories of destinations in
attempts to access unsafe web sites by number of attempts. You
can also use this report to look at the top destinations in attempts
to access unsafe web sites for any top category.
Use this report to look at the number of virus occurrences by time
interval. You can also use this report to look at the top viruses in a
specific time interval.
Use this report to look at the top viruses by number of
occurrences. You can also use this report to look at the top
sources of any top virus.
Use this report to look at the top sources of virus occurrences by
number of occurrences. You can also use this report to look at the
top viruses for any top source.
Use this report to look at the top destinations of virus occurrences
by number of occurrences. You can also use this report to look at
the top viruses for any top destination.
Use this report to look at the number of intrusions by time
interval. You can also use this report to look at the top intrusion
signatures in a specific time interval.
Use this report to look at the top intrusion signatures by number
of intrusions. You can also use this report to look at the top
sources of intrusions for any top signature.
Use this report to look at the top sources of intrusions by number
of intrusions. You can also use this report to look at the top
intrusion signatures for any top source.
Use this report to look at the top destinations of intrusions by
number of intrusions. You can also use this report to look at the
top intrusion signatures for any top destination.
Use this report to look at the top severities (significance) of
intrusions by number of intrusions. The levels of severity, in
decreasing order of significance, are Emergency (system is
unusable), Alert (immediate action is required), Critical, Error,
Warning, Notice, Informational, and Debug. You can also use this
report to look at the top intrusion signatures for any severity.
Use this screen to see which users' computers complied or failed
to comply with defined corporate policies before they can access
the network.
Chapter 3 The Web Configurator
49

Advertisement

Table of Contents
loading

This manual is also suitable for:

Vantage report 3.0Vantage report 2.3

Table of Contents