Web Block Summary Drill-Down - ZyXEL Communications VANTAGE REPORT - V3.0 User Manual

Table of Contents

Advertisement

Table 116 Security Policy > WEB Blocked > Summary
LABEL
Settings
graph
Hour (Day)
Color
Attempts
% of Attempts
View Logs
Total

8.3.2 Web Block Summary Drill-Down

Use this report to look at the top sources of attempts to access blocked web sites in a specific
time interval.
Click on a specific time interval in Security Policy > WEB Blocked > Summary to open this
screen.
Vantage Report User's Guide
DESCRIPTION
Use these fields to specify what historical information is included in the report.
Click the settings icon. The Report Display Settings screen appears.
Select a specific Start Date and End Date. The date range can be up to 30
days long, but you cannot include days that are older than Store Log Days in
System > General Configuration. Click Apply to update the report
immediately, or click Cancel to close this screen without any changes.
The graph displays the information in the table visually.
Click the pie view or the bar view icon. You can specify the Default Chart
Type in System > General Configuration.
Move your mouse over a slice in the pie chart or a bar in the bar chart to
display its identification.
Click on a slice in the pie chart to move it away from the pie chart a little.
This field displays each time interval in chronological order. If you select one
day of historical information or less (in the Last ... Days or Settings field) and it
is in the last seven days (today is day one), the time interval is hours (in 24-hour
format). Otherwise, the time interval is days.
Click on a time interval to look at the top sources of attempts to access blocked
web sites in the selected time interval. The Web Block Summary Drill-Down
report appears.
This field displays what color represents each time interval in the graph.
This field displays the number of attempts by each source to access blocked
web sites in the selected time interval.
This field displays what percentage of all blocked web access attempts was
handled in each time interval.
Click this icon to see the logs that go with the record.
This entry displays the totals for the time intervals above.
Chapter 8 Security Policy
255

Advertisement

Table of Contents
loading

This manual is also suitable for:

Vantage report

Table of Contents