Chapter 9 Web Security
9.1.4 Security Threat Top Sites Drill-Down
Use this report to look at the top sources for any top destination of blocked web
traffic.
Click on a specific destination in Report > Web Security > Security Threat >
Top Sites to open this screen.
Figure 180 Report > Web Security > Security Threat > Top Sites > Drill-Down
Each field is described in the following table.
Table 165 Report > Web Security > Security Threat > Top Sites > Drill-Down
LABEL
title
Report Type
graph
390
DESCRIPTION
This field displays the title of the drill-down report. The title includes
the date(s) you specified in the Last Days or Settings fields.
Specify Top Users, Top Hosts or By Hour as the content to be
displayed.
The graph displays the information in the table visually.
•
Click the Pie View or the Bar View icon. You can specify the
Default Chart Type in System > General Configuration.
•
Move your mouse over a slice in the pie chart or a bar in the bar
chart to display its identification.
•
Click on a slice in the pie chart to move it away from the pie chart
a little.
Vantage Report User's Guide