Table of Contents
Vantage Report User’s Guide
13
7.2.5 Top Attack Sources
..................................................................................................
283
7.2.6 Top Attack Sources Drill-Down
.................................................................................
286
7.2.7 Attack Types
.............................................................................................................
288
7.2.8 Attack Types Drill-Down
...........................................................................................
290
7.3 Intrusion Hits
......................................................................................................................
291
7.3.1 Intrusion Hits Summary
............................................................................................
291
7.3.2 Intrusion Hits Summary Drill-Down
..........................................................................
294
7.3.3 Top Intrusion Hits Signatures
...................................................................................
296
7.3.4 Top Intrusion Hits Signatures Drill-Down
..................................................................
299
7.3.5 Top Intrusion Hits Sources
.......................................................................................
301
7.3.6 Top Intrusion Hits Sources Drill-Down
......................................................................
304
7.3.7 Top Intrusion Hits Destinations
.................................................................................
306
7.3.8 Top Intrusion Hits Destinations Drill-Down
...............................................................
309
7.3.9 Intrusion Hits Severities
...........................................................................................
311
7.3.10 Intrusion Hits Severities Drill-Down
........................................................................
314
7.4 Antivirus
.............................................................................................................................
315
7.4.1 Antivirus Summary
...................................................................................................
315
7.4.2 Virus Summary Drill-Down
.......................................................................................
318
7.4.3 Top Viruses
..............................................................................................................
319
7.4.4 Top Viruses Drill-Down
.............................................................................................
322
7.4.5 Top Virus Sources
....................................................................................................
323
7.4.6 Top Virus Sources Drill-Down
.................................................................................
326
7.4.7 Top Virus Destinations
.............................................................................................
328
7.4.8 Top Virus Destinations Drill-Down
............................................................................
330
Chapter
8
E-Mail Security
......................................................................................................................
333
8.1 Virus Found
.......................................................................................................................
333
8.1.1 Virus Found Summary
.............................................................................................
333
8.1.2 Virus Found Summary Drill-Down
............................................................................
336
8.1.3 Top Viruses
..............................................................................................................
337
8.1.4 Top Viruses Drill-Down
.............................................................................................
340
8.1.5 Top Virus Sources
....................................................................................................
341
8.1.6 Top Virus Sources Drill-Down
.................................................................................
344
8.1.7 Top Virus Destinations
.............................................................................................
346
8.1.8 Top Virus Destinations Drill-Down
............................................................................
348
8.2 Spam
.................................................................................................................................
349
8.2.1 Spam Summary
........................................................................................................
349
8.2.2 Spam Summary Drill-Down
......................................................................................
352
8.2.3 Top Spam Senders
...................................................................................................
353
8.2.4 Top Spam Sources
...................................................................................................
356
8.2.5 Spam Scores
............................................................................................................
359
8.3 Intrusion Hits
......................................................................................................................
361