Table of Contents
Vantage Report User’s Guide
14
8.3.1 Intrusion Hits Summary
............................................................................................
361
8.3.2 Intrusion Hits Summary Drill-Down
..........................................................................
363
8.3.3 Top Intrusion Hits Signatures
...................................................................................
365
8.3.4 Top Intrusion Hits Signatures Drill-Down
..................................................................
367
8.3.5 Top Intrusion Hits Sources
.......................................................................................
368
8.3.6 Top Intrusion Hits Sources Drill-Down
......................................................................
371
8.3.7 Top Intrusion Hits Destinations
.................................................................................
373
8.3.8 Top Intrusion Hits Destinations Drill-Down
...............................................................
376
8.3.9 Intrusion Hits Severities
..........................................................................................
378
8.3.10 Intrusion Hits Severities Drill-Down
........................................................................
380
Chapter
9
Web Security
.........................................................................................................................
383
9.1 Security Threat
..................................................................................................................
383
9.1.1 Security Threat Summary
........................................................................................
383
9.1.2 Security Threat Summary Drill-Down
.......................................................................
385
9.1.3 Security Threat Top Web Sites
.................................................................................
387
9.1.4 Security Threat Top Sites Drill-Down
.......................................................................
390
9.1.5 Security Threat Top Users
........................................................................................
391
9.1.6 Security Threat Top Users Drill-Down
......................................................................
394
9.1.7 Security Threat Top Hosts
........................................................................................
395
9.1.8 Security Threat Top Hosts Drill-Down
......................................................................
398
9.1.9 Security Threat Categories
......................................................................................
399
9.1.10 Security Threat Categories Drill-Down
...................................................................
401
9.2 Virus Found
.......................................................................................................................
403
9.2.1 Virus Found Summary
.............................................................................................
403
9.2.2 Virus Found Summary Drill-Down
............................................................................
406
9.2.3 Top Viruses
..............................................................................................................
407
9.2.4 Top Viruses Drill-Down
.............................................................................................
409
9.2.5 Top Virus Sources
....................................................................................................
410
9.2.6 Top Virus Sources Drill-Down
.................................................................................
413
9.2.7 Top Virus Destinations
.............................................................................................
414
9.2.8 Top Virus Destinations Drill-Down
............................................................................
417
9.3 Intrusion Hits
......................................................................................................................
418
9.3.1 Intrusion Hits Summary
............................................................................................
418
9.3.2 Intrusion Hits Summary Drill-Down
..........................................................................
421
9.3.3 Top Intrusion Hits Signatures
...................................................................................
423
9.3.4 Top Intrusion Hits Signatures Drill-Down
..................................................................
426
9.3.5 Top Intrusion Hits Sources
.......................................................................................
428
9.3.6 Top Intrusion Hits Sources Drill-Down
......................................................................
431
9.3.7 Top Intrusion Hits Destinations
.................................................................................
433
9.3.8 Top Intrusion Hits Destinations Drill-Down
...............................................................
436
9.3.9 Intrusion Hits Severities
..........................................................................................
438