ZyXEL Vantage Report 2.3 User Guide - Page 391
Security Threat Top Users
View all ZyXEL Vantage Report 2.3 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 391 highlights
Chapter 9 Web Security Table 165 Report > Web Security > Security Threat > Top Sites > Drill-Down LABEL DESCRIPTION Host This field displays the top sources of blocked web traffic to the selected destination, sorted by the number of attempts attributed to each one. Color Attempts % of Attempts View Logs Total Back Each source is identified by its IP address. If Hostname Reverse is enabled in System > General Configuration, the table displays the host name, if identifiable, with the IP address. This field displays what color represents each source in the graph. This field displays the number of attempts from each source to the selected destination. This field displays what percentage of all attempts to access blocked web sites was made by each source to the selected destination. Click this icon to see the logs that go with the record. This entry displays the totals for the sources above. If the number of sources of attempts to the selected destination is greater than the maximum number of records displayed in this table, this total might be a little lower than the total in the main report. Click this to return to the main report. 9.1.5 Security Threat Top Users Use this report to look at the users for which the device blocked the most web site access attempts. Note: To look at security policy Web blocked reports, each ZyXEL device must record forwarded web packets and blocked web packets in its log. See the User's Guide for each ZyXEL device for more information. In most devices, go to Logs > Log Settings, and make sure Blocked Web Sites is enabled. Vantage Report User's Guide 391