- Table of Contents
-
- 03-Monitor
- 01-Application analysis center
- 02-Blacklist logs
- 03-Single-packet attack logs
- 04-Scanning attack logs
- 05-Flood attack logs
- 06-WAF logs
- 07-Threat logs
- 08-Reputation logs
- 09-URL filtering logs
- 10-File filtering logs
- 11-Security policy logs
- 12-IPCAR logs
- 13-Sandbox logs
- 14-Terminal status
- 15-Application audit logs
- 16-System logs
- 17-Configuration logs
- 18-Traffic logs
- 19-TopN traffic
- 20-Security policy hit analysis
- 21-TopN threats
- 22-TopN URL filtering statistics
- 23-TopN file filtering statistics
- 24-Attack defense statistics
- 25-Connection rate ranking
- 26-TopN traffic trends
- 27-Security policy hit trend analysis
- 28-TopN threat trends
- 29-TopN URL filtering trends
- 30-TopN file filtering trends
- 31-Botnet analysis
- 32-Asset security
- 33-Threat case management
- 34-Report settings
- 35-Session list
- 36-User information center
- 37-IPv4 online users
- 38-IPv6 online users
- 39-MAC authentication online users
- 40-Terminal status
- Related Documents
-
Title | Size | Download |
---|---|---|
20-Security policy hit analysis | 20.92 KB |
Security policy hit analysis
Introduction
The Policy Hit Analysis page displays security policies that have not matched any packets in bar charts, pie charts, and lists. You can specify filtering criteria to view specific analysis statistics.
View policy hit analysis statistics
1. Click Monitor > Statistics > Security Policy Hit Analysis.
The page that opens displays security policy hit analysis statistics.
2. To edit a security policy, click the policy name.
3. To filter statistics, click Statistics collection settings. On the page that opens, specify the filtering criteria and then click Start.
Table 1 Policy hit analysis filtering criteria
Item |
Description |
Type |
Select the security policy type. Options include: · IPv4. · IPv6. |
Statistics collection period |
Select a time range. Options include: · Today. · Last 7 days. · Last 30 days. · Last 12 months. · Custom. |
List display |
Specify the number of security policies to be displayed. |