Symantec 10521146 Administration Guide - Page 234

Table 9-4, Description, Types of event reports

Page 234 highlights

234 Reporting About top-level report types Table 9-4 Types of event reports Type Description Events by classful source This report sorts events by their source IP addresses and presents a count of the number of addresses that are from class A, class B and class C networks. Specify report start and end dates/times, and maximum number to display. This report is generated in table, column and bar chart formats. This report has no drill-down reports. Events by protocol This report lists the number of events detected that exploit each particular protocol, such as ICMP, UDP, TCP, or IP. You specify the report start and end dates/times. Symantec Network Security generates this report in table, bar, column and pie chart formats. This report has no drill-down reports. Events by vendor This report lists the number of events detected per vendor. For example, signatures detected by Symantec Network Security are grouped as RCRS events because RCRS is the vendor ID for Symantec Network Security. You specify the report start and end dates/times. Symantec Network Security generates this report in table, bar, column and pie chart formats. This report has no drill-down reports. Destinations of source This report lists the destination IP address(es) for any event source IP address you specify, and the number of times each address was the destination for the source address. You also specify the report start and end dates/times. This report is generated in table and bar chart formats. You can generate several drill-down reports from the Destinations of Source report. Sources of destination This report lists the source IP address(es) for any event destination IP address you specify, and the number of times each address was the source for the destination address. Specify the report start and end dates/times, and destination address. This report is generated in table and bar chart formats. You can generate several drill-down reports from the Sources of Destination report. Events by VLAN ID This report lists all events for all VLAN IDs. If the VLAN ID has not been set up, the report lists any unknown VLAN IDs as -1. You can generate drill-down event types for each VLAN ID, and further, to the event list. Events by device This report lists all events for all devices and interfaces in the network topology. You can generate drill-down event types by interface.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392

234
Reporting
About top-level report types
Events by classful
source
This report sorts events by their source IP addresses and presents
a count of the number of addresses that are from class A, class B
and class C networks. Specify report start and end dates/times,
and maximum number to display. This report is generated in
table, column and bar chart formats. This report has no
drill-down reports.
Events by protocol
This report lists the number of events detected that exploit each
particular protocol, such as ICMP, UDP, TCP, or IP. You specify the
report start and end dates/times. Symantec Network Security
generates this report in table, bar, column and pie chart formats.
This report has no drill-down reports.
Events by vendor
This report lists the number of events detected per vendor. For
example, signatures detected by Symantec Network Security are
grouped as RCRS events because RCRS is the vendor ID for
Symantec Network Security. You specify the report start and end
dates/times. Symantec Network Security generates this report in
table, bar, column and pie chart formats. This report has no
drill-down reports.
Destinations of
source
This report lists the destination IP address(es) for any event
source IP address you specify, and the number of times each
address was the destination for the source address. You also
specify the report start and end dates/times. This report is
generated in table and bar chart formats. You can generate several
drill-down reports from the Destinations of Source report.
Sources of
destination
This report lists the source IP address(es) for any event
destination IP address you specify, and the number of times each
address was the source for the destination address. Specify the
report start and end dates/times, and destination address. This
report is generated in table and bar chart formats. You can
generate several drill-down reports from the Sources of
Destination report.
Events by VLAN ID
This report lists all events for all VLAN IDs. If the VLAN ID has
not been set up, the report lists any unknown VLAN IDs as
-1
.
You can generate drill-down event types for each VLAN ID, and
further, to the event list.
Events by device
This report lists all events for all devices and interfaces in the
network topology. You can generate drill-down event types by
interface.
Table 9-4
Types of event reports
Type
Description