- Table of Contents
-
- 02-Monitor
- 01-Attack defense statistics
- 02-Application audit logs
- 03-Blacklist logs
- 04-File filtering logs
- 05-TopN file filtering statistics
- 06-TopN file filtering trends
- 07-Flood attack logs
- 08-DNS cache information
- 09-Transparent DNS proxy statistics
- 10-Link load balancing statistics
- 11-Server load balancing statistics
- 12-URL visit trends
- 13-Operation logs
- 14-Report settings
- 15-Scanning attack logs
- 16-Session list
- 17-Single-packet attack logs
- 18-System logs
- 19-Threat logs
- 20-TopN threats
- 21-TopN threat trends
- 22-Traffic logs
- 23-TopN traffic
- 24-TopN traffic trends
- 25-URL filtering logs
- 26-TopN URL filtering statistics
- 27-TopN URL filtering trends
- 28-User information center
- 29-Security policy log
- 30-IPv4 online users
- 31-IPv6 online users
- 32-Load balancing logging
- 33-LB session information
- 34-MAC authentication online users
- Related Documents
-
Title | Size | Download |
---|---|---|
21-TopN threat trends | 49.65 KB |
This help contains the following topics:
¡ Attacked target threat trend
Introduction
By analyzing the trends of detected threat events in various perspectives, the device generates the following types of threat trend reports to help illustrate the peak periods during which threats are most likely to happen and the time periods highly risky threats are most likely to happen:
· User Threat Trend.
· Application Threat Trend.
· Threat Type Threat Trend.
· Attacker Threat Trend.
· Attacked Target Threat Trend.
· Threat Name Threat Trend.
These reports help administrators adjust security policies to effectively protect the company network against threats.
On each of the preceding report configuration page, you can customize conditions such as the time range and data range for statistics collection. Then, you can generate the report and export the report as needed.
User threat trend
Perform this task to generate the user-based threat trend report and export the report.
Procedure
1. Click Stats conditions in the top left corner of the page.
2. Configure the statistics collection conditions.
Table 1 Statistics collection condition configuration items for the user-based threat trend report
Item |
Description |
User |
Select Top 5 users to collect statistics only for the top 5 users. Select Specify users and specify the users for statistics collection. |
Threat type |
Select the threat types. Options are: · IPS. · Anti-virus. · All. |
Time range |
Select a time range from the list. Options are: · Today. · Past week. · Past month. · Custom. |
3. Click Start.
4. To export the user-based threat trend report, click Export report.
Application threat trend
Perform this task to generate the application-based threat trend report and export the report.
Procedure
1. Click Stats conditions in the top left corner of the page.
2. Configure the statistics collection conditions.
Table 2 Statistics collection condition configuration items for the application-based threat trend report
Item |
Description |
Application |
Select Top 5 applications to collect statistics only for the top 5 applications. Select Specify applications and specify the applications for statistics collection. |
Time range |
Select a time range from the list. Options are: · Today. · Past week. · Past month. · Custom. |
3. Click Start.
4. To export the application-based threat trend report, click Export report.
Threat type threat trend
Perform this task to generate the threat type-based threat trend report and export the report.
Procedure
1. Click Stats conditions in the top left corner of the page.
2. Configure the statistics collection conditions.
Table 3 Statistics collection condition configuration items for the threat type-based threat trend report
Item |
Description |
Threat type |
Select a threat type. Options are: · IPS. · Anti-virus. |
Time range |
Select a time range from the list. Options are: · Today. · Past week. · Past month. · Custom. |
3. Click Start.
4. To export the threat type-based threat trend report, click Export report.
Attacker threat trend
Perform this task to generate the attacker-based threat trend report and export the report.
Procedure
1. Click Stats conditions in the top left corner of the page.
2. Configure the statistics collection conditions.
Table 4 Statistics collection condition configuration items for the attacker-based threat trend report
Item |
Description |
Attacker |
Select Top 5 attackers to collect statistics only for the top 5 attackers. Select Specify attackers and specify the attackers for statistics collection. |
Threat type |
Select the threat types. Options are: · IPS. · Anti-virus. · All. |
Time range |
Select a time range from the list. Options are: · Today. · Past week. · Past month. · Custom. |
3. Click Start.
4. To export the attacker-based threat trend report, click Export report.
Attacked target threat trend
Perform this task to generate the attacked target-based threat trend report and export the report.
Procedure
1. Click Stats conditions in the top left corner of the page.
2. Configure the statistics collection conditions.
Table 5 Statistics collection condition configuration items for the attacked target-based threat trend report
Item |
Description |
Attacked target |
Select Top 5 attacked targets to collect statistics only for the top 5 attacked targets. Select Specify attacked targets and specify the attacked targets for statistics collection. |
Threat type |
Select the threat types. Options are: · IPS. · Anti-virus. · All. |
Time range |
Select a time range from the list. Options are: · Today. · Past week. · Past month. · Custom. |
3. Click Start.
4. To export the attacked target-based threat trend report, click Export report.
Threat name threat trend
Perform this task to generate the threat name-based threat trend report and export the report.
Procedure
1. Click Stats conditions in the top left corner of the page.
2. Configure the statistics collection conditions.
Table 6 Statistics collection condition configuration items for the threat name-based threat trend report
Item |
Description |
Threat ID |
Select Top 5 threat IDs to collect statistics only for the top 5 threats. Select Specify threat IDs and specify the IDs of the threats for statistics collection. |
Threat type |
Select a threat type. Options are: · IPS. · Anti-virus. |
Attack type |
Select the attack types. Options are: · Attacker. · Attacked target. · All. |
Time range |
Select a time range from the list. Options are: · Today. · Past week. · Past month. · Custom. |
3. Click Start.
4. To export the threat name-based threat trend report, click Export report.