Chapter 9 Web Security
9.1.6 Security Threat Top Users Drill-Down
Use this report to look at the top destinations for any user for which the device
blocked the most web site access attempts.
Click on a specific source in Report > Web Security > Security Threat > Top
Users to open this screen.
Figure 182 Report > Web Security > Security Threat > Top Users > Drill-Down
Each field is described in the following table.
Table 167 Report > Web Security > Security Threat > Top Users > Drill-Down
LABEL
title
Report Type
graph
394
DESCRIPTION
This field displays the title of the drill-down report. The title includes
the date(s) you specified in the Last Days or Settings fields.
Specify Top Categories, Top Sites or By Hour as the content to be
displayed.
The graph displays the information in the table visually.
•
Click the Pie View or the Bar View icon. You can specify the
Default Chart Type in System > General Configuration.
•
Move your mouse over a slice in the pie chart or a bar in the bar
chart to display its identification.
•
Click on a slice in the pie chart to move it away from the pie chart
a little.
Vantage Report User's Guide