- Table of Contents
-
- 02-Monitor
- 01-Attack defense statistics
- 02-Application audit logs
- 03-Blacklist logs
- 04-File filtering logs
- 05-TopN file filtering statistics
- 06-TopN file filtering trends
- 07-Flood attack logs
- 08-DNS cache information
- 09-Transparent DNS proxy statistics
- 10-Link load balancing statistics
- 11-Server load balancing statistics
- 12-URL visit trends
- 13-Operation logs
- 14-Report settings
- 15-Scanning attack logs
- 16-Session list
- 17-Single-packet attack logs
- 18-System logs
- 19-Threat logs
- 20-TopN threats
- 21-TopN threat trends
- 22-Traffic logs
- 23-TopN traffic
- 24-TopN traffic trends
- 25-URL filtering logs
- 26-TopN URL filtering statistics
- 27-TopN URL filtering trends
- 28-User information center
- 29-Security policy log
- 30-IPv4 online users
- 31-IPv6 online users
- 32-Load balancing logging
- 33-LB session information
- 34-MAC authentication online users
- Related Documents
-
Title | Size | Download |
---|---|---|
14-Report settings | 18.04 KB |
Introduction
The device can collect and analyze data of various services to generate the following types of reports:
· Summary report—Displays summarized service statistics collected over a time range.
· Comparison report—Provides comparison of service statistics collected over two time ranges that contain the same number of days.
· Intelligent report—Provides intelligent analysis of users' work efficiency, data leakage, and turnover risks based on their network access behaviors.
· Comprehensive report—Illustrates the overall device operational and network security status based on analysis of critical service statistics.