B
F
R
EST
ILTERING AND
EPORTING
Step B: Navigate to the Security Policy Violations report
Step C: Navigate to the Traffic Analysis report
114
P
S
RACTICES
ECURITY
Click the Security Policy Violations tab to display the the Security Policy Viola-
tions report view:
This report provides information on each instance in which an end user breached
a security policy.
Click the Traffic Analysis tab to display the Traffic Analysis report view:
This report shows activity for end user access of objects utilizing an excessive
amount of network bandwidth.
R
U
S
EPORTS
SAGE
CENARIOS
M86 S
I
G
ECURITY
NSTALLATION
UIDE