Web Allowed Summary Drill-Down - ZyXEL Communications VANTAGE REPORT Manual

Hide thumbs Also See for VANTAGE REPORT:
Table of Contents

Advertisement

Table 147 Report > Security Policy > WEB Allowed > Summary
LABEL
Settings
graph
Hour (Day)
Color
Attempts
% of Attempts
View Logs
Total

8.4.2 Web Allowed Summary Drill-Down

Use this report to look at the top sources of attempts to access allowed web sites
in a specific time interval.
Vantage Report User's Guide
DESCRIPTION
Use these fields to specify what historical information is included in
the report. Click the settings icon. The Report Display Settings
screen appears.
Select a specific Start Date and End Date. The date range can be up
to 30 days long, but you cannot include days that are older than
Store Log Days in System > General Configuration. Click Apply
to update the report immediately, or click Cancel to close this screen
without any changes.
The graph displays the information in the table visually.
Click the Pie View or the Bar View icon. You can specify the
Default Chart Type in System > General Configuration.
Move your mouse over a slice in the pie chart or a bar in the bar
chart to display its identification.
Click on a slice in the pie chart to move it away from the pie chart
a little.
This field displays each time interval in chronological order. If you
select one day of historical information or less (in the Last ... Days or
Settings field) and it is in the last seven days (today is day one), the
time interval is hours (in 24-hour format). Otherwise, the time
interval is days.
Click on a time interval to look at the top sources of attempts to
access allowed web sites in the selected time interval.
This field displays what color represents each time interval in the
graph.
This field displays the number of attempts to access allowed web sites
in each time interval.
This field displays the percentage of all attempts in each time interval.
Click this icon to see the logs that go with the record.
This entry displays the totals for the time intervals above.
Chapter 8 Security Policy
353

Advertisement

Table of Contents
loading

Table of Contents