ZyXEL Vantage Report 2.3 User Guide - Page 48
Top Sources
View all ZyXEL Vantage Report 2.3 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 48 highlights
Chapter 3 The Web Configurator Table 10 Menu Panel LEVEL 1/2 LEVEL 3 Summary Top Senders Top Sources Intrusion Hits Summary Top Intrusions Top Sources Top Destinations By Severity Web Security Security Threat Summary Top Sites Top Users Top Hosts FUNCTION Use this report to look at the number of spam messages by time interval. You can also use this report to look at the top combinations of senders and first SMTP servers to which the spam was sent in a specific time interval. Use this report to look at the top combinations of senders and first SMTP servers to which the spam was sent by number of messages. Use this report to look at the top sources (last mail relay) of spam messages by number of messages. Use this report to look at the number of intrusions by time interval. You can also use this report to look at the top intrusion signatures in a specific time interval. Use this report to look at the top intrusion signatures by number of intrusions. You can also use this report to look at the top sources of intrusions for any top signature. Use this report to look at the top sources of intrusions by number of intrusions. You can also use this report to look at the top intrusion signatures for any top source. Use this report to look at the top destinations of intrusions by number of intrusions. You can also use this report to look at the top intrusion signatures for any top destination. Use this report to look at the top severities (significance) of intrusions by number of intrusions. The levels of severity, in decreasing order of significance, are Emergency (system is unusable), Alert (immediate action is required), Critical, Error, Warning, Notice, Informational, and Debug. You can also use this report to look at the top intrusion signatures for any severity. Use this report to look at the number of attempts to access unsafe web sites by time interval. You can also use this report to look at the top sources of attempts to access unsafe web sites in a specific time interval. Use this report to look at the top destinations of attempts to access unsafe web sites by number of attempts. You can also use this report to look at the top sources of attempts to access unsafe web sites for any top destination. Use this report to look at the top users accessing unsafe web traffic. You can also use this report to look at the top destinations for any top source of unsafe web traffic. Use this report to look at the top sources of attempts to access unsafe web sites by number of attempts. You can also use this report to look at the top destinations in attempts to access unsafe web sites for any top source. 48 Vantage Report User's Guide