Symantec 10490452 Administration Guide - Page 170

Table 9-5, Report Type, Required Report, Data Storage, Options Reports, Settings

Page 170 highlights

170 Working with reports Choosing a report Table 9-5 Available Attack reports Report Type: Displays... Required Report Data Storage Options (Reports Settings Page) Overview Total messages processed and number and percentage of directory harvest, None spam, and virus attacks versus messages processed. Top Directory Harvest Attacks IP addresses from which the most directory harvest attacks have been detected. For each IP address, the total messages processed and number and percentage of directory harvest attacks versus messages processed are listed. Sender IP connections Top Virus Attacks IP addresses from which the most virus attacks have been detected. For Sender IP each IP address, the total messages processed and number and percentage connections of virus attacks versus messages processed are listed. Top Spam Attacks IP addresses from which the most spam attacks have been detected. For Sender IP each IP address, the total messages processed and number and percentage connections of spam attacks versus messages processed are listed. Table 9-6 Available Sender Authentication reports Report Type: Displays... Required Report Data Storage Options (Reports Settings Page) Overview Total messages processed and number and percentage of sender authentication sessions that were attempted, not attempted, successful, and failed versus messages processed. None Top Attempted Senders Email addresses from which the most sender authentication attempts have been detected. For each email address, the total messages processed and number and percentage of sender authentication attempts versus messages processed are listed. Senders Top Not Attempted Senders Email addresses from which the fewest sender authentication attempts have been detected. For each email address, the total messages processed and number and percentage of not attempted sender authentication sessions versus messages processed are listed. Senders

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258

170
Working with reports
Choosing a report
Table 9-5
Available Attack reports
Report Type:
Displays...
Required Report
Data Storage
Options (Reports
Settings Page)
Overview
Total messages processed and number and percentage of directory harvest,
spam, and virus attacks versus messages processed.
None
Top Directory
Harvest Attacks
IP addresses from which the most directory harvest attacks have been
detected. For each IP address, the total messages processed and number
and percentage of directory harvest attacks versus messages processed are
listed.
Sender IP
connections
Top Virus
Attacks
IP addresses from which the most virus attacks have been detected. For
each IP address, the total messages processed and number and percentage
of virus attacks versus messages processed are listed.
Sender IP
connections
Top Spam
Attacks
IP addresses from which the most spam attacks have been detected. For
each IP address, the total messages processed and number and percentage
of spam attacks versus messages processed are listed.
Sender IP
connections
Table 9-6
Available Sender Authentication reports
Report Type:
Displays...
Required Report
Data Storage
Options (Reports
Settings Page)
Overview
Total messages processed and number and percentage of sender
authentication sessions that were attempted, not attempted, successful,
and failed versus messages processed.
None
Top Attempted
Senders
Email addresses from which the most sender authentication attempts have
been detected. For each email address, the total messages processed and
number and percentage of sender authentication attempts versus
messages processed are listed.
Senders
Top Not
Attempted
Senders
Email addresses from which the fewest sender authentication attempts
have been detected. For each email address, the total messages processed
and number and percentage of not attempted sender authentication
sessions versus messages processed are listed.
Senders