ZyXEL Vantage Report 2.3 User Guide - Page 49
Intrusion Hits
View all ZyXEL Vantage Report 2.3 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 49 highlights
Chapter 3 The Web Configurator Table 10 Menu Panel LEVEL 1/2 LEVEL 3 By Category Virus Found Summary Top Viruses Top Sources Top Destination Intrusion Hits Summary Top Intrusions Top Sources Top Destinations By Severity Security Policy Enforcement EPS EPS Content Filter(All) FUNCTION Use this report to look at the top categories of destinations in attempts to access unsafe web sites by number of attempts. You can also use this report to look at the top destinations in attempts to access unsafe web sites for any top category. Use this report to look at the number of virus occurrences by time interval. You can also use this report to look at the top viruses in a specific time interval. Use this report to look at the top viruses by number of occurrences. You can also use this report to look at the top sources of any top virus. Use this report to look at the top sources of virus occurrences by number of occurrences. You can also use this report to look at the top viruses for any top source. Use this report to look at the top destinations of virus occurrences by number of occurrences. You can also use this report to look at the top viruses for any top destination. Use this report to look at the number of intrusions by time interval. You can also use this report to look at the top intrusion signatures in a specific time interval. Use this report to look at the top intrusion signatures by number of intrusions. You can also use this report to look at the top sources of intrusions for any top signature. Use this report to look at the top sources of intrusions by number of intrusions. You can also use this report to look at the top intrusion signatures for any top source. Use this report to look at the top destinations of intrusions by number of intrusions. You can also use this report to look at the top intrusion signatures for any top destination. Use this report to look at the top severities (significance) of intrusions by number of intrusions. The levels of severity, in decreasing order of significance, are Emergency (system is unusable), Alert (immediate action is required), Critical, Error, Warning, Notice, Informational, and Debug. You can also use this report to look at the top intrusion signatures for any severity. Use this screen to see which users' computers complied or failed to comply with defined corporate policies before they can access the network. Vantage Report User's Guide 49