Table of Contents
Vantage Report 3.8 User’s Guide
9
7.3 Intrusion Hits ...................................................................................................................................240
7.3.1 Intrusion Hits Summary .........................................................................................................240
7.3.2 Intrusion Hits Summary Drill-Down ........................................................................................241
7.3.3 Top Intrusion Hits Signatures .................................................................................................243
7.3.4 Top Intrusion Hits Signatures Drill-Down ...............................................................................246
7.3.5 Top Intrusion Hits Sources .....................................................................................................247
7.3.6 Top Intrusion Hits Sources Drill-Down ...................................................................................250
7.3.7 Top Intrusion Hits Destinations ..............................................................................................251
7.3.8 Top Intrusion Hits Destinations Drill-Down .............................................................................253
7.3.9 Intrusion Hits Severities ........................................................................................................254
7.3.10 Intrusion Hits Severities Drill-Down .....................................................................................255
7.4 Antivirus ..........................................................................................................................................257
7.4.1 Antivirus Summary ................................................................................................................257
7.4.2 Virus Summary Drill-Down .....................................................................................................258
7.4.3 Top Viruses ............................................................................................................................260
7.4.4 Top Viruses Drill-Down ..........................................................................................................261
7.4.5 Top Virus Sources ..................................................................................................................263
7.4.6 Top Virus Sources Drill-Down ...............................................................................................265
7.4.7 Top Virus Destinations ...........................................................................................................266
7.4.8 Top Virus Destinations Drill-Down ......................................................................................267
Chapter 8
E-Mail Security..................................................................................................................................269
8.1 Virus Found .....................................................................................................................................269
8.1.1 Virus Found Summary ...........................................................................................................269
8.1.2 Virus Found Summary Drill-Down .........................................................................................271
8.1.3 Top Viruses ............................................................................................................................273
8.1.4 Top Viruses Drill-Down ..........................................................................................................274
8.1.5 Top Virus Sources ..................................................................................................................276
8.1.6 Top Virus Sources Drill-Down ...............................................................................................278
8.1.7 Top Virus Destinations ...........................................................................................................279
8.1.8 Top Virus Destinations Drill-Down .........................................................................................281
8.2 Spam ...............................................................................................................................................282
8.2.1 Spam Summary .....................................................................................................................282
8.2.2 Spam Summary Drill-Down ...................................................................................................283
8.2.3 Top Spam Senders ................................................................................................................285
8.2.4 Top Spam Sender IP Addresses ............................................................................................286
8.2.5 Top Spam Subjects ................................................................................................................288
8.2.6 Spam By Category .................................................................................................................290
8.3 Intrusion Hits ...................................................................................................................................292
8.3.1 Intrusion Hits Summary .........................................................................................................292
8.3.2 Intrusion Hits Summary Drill-Down ........................................................................................294
8.3.3 Top Intrusion Hits Signatures .................................................................................................296