ZyXEL Vantage Report 2.3 User Guide - Page 372
Table 157
View all ZyXEL Vantage Report 2.3 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 372 highlights
Chapter 8 E-Mail Security Click on a specific source in Report > E-Mail Security > Intrusion Hits > Top Sources to open this screen. Figure 172 Report > E-Mail Security > Intrusion Hits > Top Sources > Drill-Down Each field is described in the following table. Table 157 Report > E-Mail Security > Intrusion Hits > Top Sources > Drill-Down LABEL DESCRIPTION graph The graph displays the information in the table visually. Intrusion Signature Color Severity Type Intrusions • Click the Pie View or the Bar View icon. You can specify the Default Chart Type in System > General Configuration. • Move your mouse over a slice in the pie chart or a bar in the bar chart to display its identification. • Click on a slice in the pie chart to move it away from the pie chart a little. This field displays the top intrusion signatures from the selected source, sorted by the number of intrusions by each one. This field displays what color represents each intrusion signature in the graph. This field displays the severity of each intrusion signature. This field displays what kind of intrusion each intrusion signature is. This corresponds to IDP > Signature > Attack Type in most ZyXEL devices. This field displays the number of intrusions by the selected source using each intrusion signature. 372 Vantage Report User's Guide