Chapter 7 Network Attack
7.2.10 Intrusion Severities Drill-Down
Use this report to look at the intrusion signatures for any severity.
Click on a specific severity in Report > Network Attack > Intrusion > By
Severity to open this screen.
Figure 130 Report > Network Attack > Intrusion > By Severity > Drill-Down
Each field is described in the following table.
Table 118 Report > Network Attack > Intrusion > By Severity > Drill-Down
LABEL
graph
Intrusion
Signature
288
DESCRIPTION
The graph displays the information in the table visually.
•
Click the Pie View or the Bar View icon. You can specify the
Default Chart Type in System > General Configuration.
•
Move your mouse over a slice in the pie chart or a bar in the bar
chart to display its identification.
•
Click on a slice in the pie chart to move it away from the pie chart
a little.
This field displays the intrusion signatures of the selected severity,
sorted by the number of intrusions by each one.
Vantage Report User's Guide