Report Name | Description |
---|---|
Suspicious Objects Filtering Trend | Extract Suspicious Objects Filtering Trend from Virtual Analyzer logs that match any of the following "Reason for Action" types:
Sample: Click the image to enlarge. |
Report Name | Description |
---|---|
Top N Applications Visited | Extract Top N Applications from Internet Access logs
Click the image to enlarge. |
Top N URL Categories Visited | Extract Top N URL Categories from Internet Access logs
Click the image to enlarge. |
Top N Sites Visited | Extract Top N Sites from Internet Access logs
Click the image to enlarge. |
Top N Users by Requests | Extract Top N Users by Requests from Internet Access logs
Click the image to enlarge. |
Top N Departments by Requests | Extract Top N Departments by Requests from Internet Access logs
Click the image to enlarge. |
Top N URL Categories by Browse Time | Extract Top N URL Categories by Browse Time from Internet Access logs
Click the image to enlarge. |
Top N Sites Visited by Browse Time | Extract Top N Sites Visited by Browse Time from Internet Access logs
Click the image to enlarge. |
Top N Users by Browse Time | Extract Top N Users by Browse Time from Internet Access logs
Click the image to enlarge. |
Top N URL Categories by Traffic | Extract Top N URL Categories by Traffic from Internet Access logs
Click the image to enlarge. |
Top N Applications by Traffic | Extract Top N Applications by Traffic from Internet Access logs
Click the image to enlarge. |
Top N Users by Traffic | Extract Top N Users by Traffic from Internet Access logs
Click the image to enlarge. |
Top N Departments by Traffic | Extract Top N Departments by Traffic from Internet Access logs
Click the image to enlarge. |
Top N Sites by Traffic | Extract Top N Sites by Traffic from Internet Access logs
Click the image to enlarge. |
Top N Gateway Locations by Traffic | Extract Top N Gateway Locations by Traffic from Internet Access logs
Click the image to enlarge. |
Total Traffic by Date | Extract Total Traffic by Date from Internet Access logs
Click the image to enlarge. |
Report Type | Description |
---|---|
Top N URL Categories Violated | Extract Top N URL Categories from Policy Enforcement logs that match any of the following "Reason for Action" types:
Click the image to enlarge. |
Top N Applications Violated | Extract Top N Applications from Policy Enforcement logs that match any of the following "Reason for Action" types:
Click the image to enlarge. |
Top N Users Violated | Extract Top N Users from Policy Enforcement logs that match any of the following "Reason for Action" types:
Click the image to enlarge. |
Top N Departments Violated | Extract Top N Departments from Policy Enforcement logs that match any of the following "Reason for Action" types:
Click the image to enlarge. |
Top N Sites Violated | Extract Top N Sites from Policy Enforcement logs that match any of the following "Reason for Action" types:
Click the image to enlarge. |
Top N Gateway Locations Violated | Extract Top N Gateway Locations from Policy Enforcement logs that match any of the following "Reason for Action" types:
Click the image to enlarge. |
Top N Malware Spyware Detection | Extract Top N Malware Spyware from Policy Enforcement logs that match any of the following "Reason for Action" types:
Click the image to enlarge. |
Top N Malicious Sites Violated | Extract Top N Malicious Sites from Policy Enforcement logs that match any of the following "Reason for Action" types:
Click the image to enlarge. |
Top N Botnet Detection | Extract Top N Botnet from Policy Enforcement logs that match any of the following "Reason for Action" types:
Click the image to enlarge. |
Top N Users by Botnet Detection | Extract Top N Users by Botnet from Policy Enforcement logs that match any of the following "Reason for Action" types:
Click the image to enlarge. |
Top N Users by Malware Spyware Detection | Extract Top N Malware Spyware from Policy Enforcement logs that match any of the following "Reason for Action" types:
Click the image to enlarge. |
Top N Users by Malicious Site Detection | Extract Top N Users by Malicious Site from Policy Enforcement logs that match any of the following "Reason for Action" types:
Click the image to enlarge. |
Top N Departments by Malware Spyware Detection | Extract Top N Departments by Malware Spyware from Policy Enforcement logs that match any of the following "Reason for Action" types:
Click the image to enlarge. |
Top N Departments by Malicious Site Detection | Extract Top N Departments by Malicious Site from Policy Enforcement logs that match any of the following "Reason for Action" types:
Click the image to enlarge. |
Top N Gateway Locations by Malware Spyware Detection | Extract Top N Gateway Locations by Malware Spyware from Policy Enforcement logs that match any of the following "Reason for Action" types:
Click the image to enlarge. |
Malicious Sites Detected by Date | Extract Malicious Sites Detected by Date from Policy Enforcement logs that match any of the following "Reason for Action" types:
Click the image to enlarge. |
Malwares Spywares Detected by Date | Extract Malwares Spywares Detected by Date from Policy Enforcement logs that match any of the following "Reason for Action" types:
Click the image to enlarge. |
Malware Spyware Detection Trend | Extract Malware Spyware Detection Trend from Policy Enforcement logs that match any of the following "Reason for Action" types:
Click the image to enlarge. |
Malware Spyware Detection Trend by Department | Extract Malware Spyware Detection Trend by Department from Policy Enforcement logs that match any of the following "Reason for Action" types:
Click the image to enlarge. |
Malware Spyware Detection Trend by Gateway Location | Extract Malware Spyware Detection Trend by Gateway Location from Policy Enforcement logs that match any of the following "Reason for Action" types:
Click the image to enlarge. |