Reports Per Incident Schedule - Symantec 10521146 - Network Security 7120 Administration Manual

Administration guide
Hide thumbs Also See for 10521146 - Network Security 7120:
Table of Contents

Advertisement

232 Reporting
About top-level report types

Reports per incident schedule

Symantec Network Security generates the following types of incident reports:
Table 9-2
Types of incident reports
Type
Description
Incidents per month This reports displays the total number of incidents that occurred
during each month of the time period you specify.
If a month is not listed in the report, then no incidents were
detected during that month. Symantec Network Security
generates this report in table and column chart formats. You can
generate several drill-down reports for each month listed in the
Incidents Per Month report.
Incidents per day
This reports displays the total number of incidents that occurred
per day during the time period you specify. If a day is not listed in
the report, then no incidents were detected during that day.
Symantec Network Security generates this report in table and
column chart formats. You can generate several drill-down
reports for each day listed in the Incidents Per Day report.
Incidents per hour
This report displays the total number of incidents that occurred
per hour during the time period you specify. If an hour is not
listed in the report, then no incidents were detected during that
hour. The Incidents Per Hour report is generated in table and
column chart formats. You can generate several drill-down
reports for each hour listed in the Incidents Per Hour report.
Incident list
For each incident that occurred during the report period you
specify, this report lists the incident start date and time, event
type to which the incident is mapped, the name of the device
where Symantec Network Security detected the incident, and the
number of the Network Security software node that detected the
incident. Symantec Network Security generates this report in
table format only. You can generate several drill-down reports for
each incident listed in the Incident List report.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network security

Table of Contents