MSI Supero CSE-M35S Podręcznik Użytkownika Strona 85

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
Przeglądanie stron 84
ManageEngine Firewall Analyzer :: User Guide
84
Zoho Corp.
The Top Attackers report shows the top source IP addresses or host names from which
attacks are originating, along with the protocol used for the attack and the number of
hits. The Top Targets report shows the top destination IP addresses or host names that
have been attacked, along with the protocol used for the attack and the number of hits.
Drill down from these graphs to see the following details:
Field
Description
Attack
The name or id (as defined by the firewall) of the attack that was sent
or received
Destination/
Host
The destination host or IP address to which the attack was sent/
The host or IP address that sent the attack
Severity
The severity level of the attack, as defined by the firewall
Hits
The number of times the attack was sent to or received by the same
host
Subtype
The subtype of the attack, as defined by the firewall
Time
The time stamp when the attack was sent or received
Status
The status of the attack that was sent or received
Message
The attack message generated by the firewall
The Top Protocols Used By Attacks report shows the top protocols used by each
attack. The Top Attacks By Priority report shows the top attacks classified based on
priority like Alert, Emergency etc.
Drill down from these graphs to see the following details:
Field Description
Host
The host or IP address that sent the attack
Destination
The destination host or IP address to which the attack was sent
Severity/
Protocol
The severity level of the attack, as defined by the firewall/
The protocol used to send the attack
Hits
The number of times the attack was sent to or received by the same
host
Subtype
The subtype of the attack, as defined by the firewall
Time
The time stamp when the attack was sent or received
Status
The status of the attack that was sent or received
Message
The attack message generated by the firewall
The Top Attacks with Status report shows the status of the Top Attacks (ID or names)
based on the number of hits. Drill down from this graph to see the following details:
Field
Description
Attack
The name or id (as defined by the firewall) of the attack that was sent or
received
Host
The host or IP address that sent the attack file
Destination
The destination host or IP address to which the attack file was sent
Protocol
The protocol used by the attack to send this attack file
Severity
The severity level of the attack, as defined by the firewall
Przeglądanie stron 84
1 2 ... 80 81 82 83 84 85 86 87 88 89 90 ... 308 309

Komentarze do niniejszej Instrukcji

Brak uwag