- Table of Contents
-
- 03-Monitor
- 01-Application analysis center
- 02-Blacklist logs
- 03-Single-packet attack logs
- 04-Scanning attack logs
- 05-Flood attack logs
- 06-WAF logs
- 07-Threat logs
- 08-Reputation logs
- 09-URL filtering logs
- 10-File filtering logs
- 11-Security policy logs
- 12-IPCAR logs
- 13-Sandbox logs
- 14-Terminal status
- 15-Application audit logs
- 16-System logs
- 17-Configuration logs
- 18-Traffic logs
- 19-TopN traffic
- 20-Security policy hit analysis
- 21-TopN threats
- 22-TopN URL filtering statistics
- 23-TopN file filtering statistics
- 24-Attack defense statistics
- 25-Connection rate ranking
- 26-TopN traffic trends
- 27-Security policy hit trend analysis
- 28-TopN threat trends
- 29-TopN URL filtering trends
- 30-TopN file filtering trends
- 31-Botnet analysis
- 32-Asset security
- 33-Threat case management
- 34-Report settings
- 35-Session list
- 36-User information center
- 37-IPv4 online users
- 38-IPv6 online users
- 39-MAC authentication online users
- 40-Terminal status
- Related Documents
-
Title | Size | Download |
---|---|---|
28-TopN threat trends | 49.97 KB |
TopN threat trends
This help contains the following topics:
¡ Attacked target threat trend
Introduction
By analyzing the trends of detected threat events in various perspectives, the device generates the following types of threat trend reports to help illustrate the peak periods during which threats are most likely to happen and the time periods highly risky threats are most likely to happen:
· User Threat Trend.
· Application Threat Trend.
· Threat Type Threat Trend.
· Attacker Threat Trend.
· Attacked Target Threat Trend.
· Threat ID Threat Trend.
These reports help administrators adjust security policies to effectively protect the company network against threats.
On each of the preceding report configuration page, you can customize conditions such as the time range and data range for statistics collection. Then, you can generate the report and export the report as needed.
User threat trend
Perform this task to generate the user-based threat trend report and export the report.
Procedure
1. Click Stats conditions in the top left corner of the page.
2. Configure the statistics collection conditions.
Table 1 Statistics collection condition configuration items for the user-based threat trend report
Item |
Description |
User |
Select Top 5 users to collect statistics only for the top 5 users. Select Specify users and specify the users for statistics collection. |
Threat type |
Select the threat types. Options are: · IPS. · Anti-virus. · All. |
Time range |
Select a time range from the list. Options are: · Today. · Past week. · Past month. · Custom. |
3. Click Start.
4. To export the user-based threat trend report, click Export report.
Application threat trend
Perform this task to generate the application-based threat trend report and export the report.
Procedure
1. Click Stats conditions in the top left corner of the page.
2. Configure the statistics collection conditions.
Table 2 Statistics collection condition configuration items for the application-based threat trend report
Item |
Description |
Application |
Select Top 5 applications to collect statistics only for the top 5 applications. · Select Specify applications and specify the applications for statistics collection. |
Time range |
Select a time range from the list. Options are: · Today. · Past week. · Past month. · Custom. |
3. Click Start.
4. To export the application-based threat trend report, click Export report.
Threat type threat trend
Perform this task to generate the threat type-based threat trend report and export the report.
Procedure
1. Click Stats conditions in the top left corner of the page.
2. Configure the statistics collection conditions.
Table 3 Statistics collection condition configuration items for the threat type-based threat trend report
Item |
Description |
Threat type |
Select a threat type. Options are: · IPS. · Anti-virus. |
Time range |
Select a time range from the list. Options are: · Today. · Past week. · Past month. · Custom. |
3. Click Start.
4. To export the threat type-based threat trend report, click Export report.
Attacker threat trend
Perform this task to generate the attacker-based threat trend report and export the report.
Procedure
1. Click Stats conditions in the top left corner of the page.
2. Configure the statistics collection conditions.
Table 4 Statistics collection condition configuration items for the attacker-based threat trend report
Item |
Description |
Attacker |
Select Top 5 attackers to collect statistics only for the top 5 attackers. · Select Specify attackers and specify the attackers for statistics collection. |
Threat type |
Select the threat types. Options are: · IPS. · Anti-virus. · All. |
Time range |
Select a time range from the list. Options are: · Today. · Past week. · Past month. · Custom. |
3. Click Start.
4. To export the attacker-based threat trend report, click Export report.
Attacked target threat trend
Perform this task to generate the attacked target-based threat trend report and export the report.
Procedure
1. Click Stats conditions in the top left corner of the page.
2. Configure the statistics collection conditions.
Table 5 Statistics collection condition configuration items for the attacked target-based threat trend report
Item |
Description |
Attacked target |
Select Top 5 attacked targets to collect statistics only for the top 5 attacked targets. · Select Specify attacked targets and specify the attacked targets for statistics collection. |
Threat type |
Select the threat types. Options are: · IPS. · Anti-virus. · All. |
Time range |
Select a time range from the list. Options are: · Today. · Past week. · Past month. · Custom. |
3. Click Start.
4. To export the attacked target-based threat trend report, click Export report.
Threat ID threat trend
Perform this task to generate the threat ID-based threat trend report and export the report.
Procedure
1. Click Stats conditions in the top left corner of the page.
2. Configure the statistics collection conditions.
Table 6 Statistics collection condition configuration items for the threat ID-based threat trend report
Item |
Description |
Threat ID |
Select Top 5 threat IDs to collect statistics only for the top 5 threats. Select Specify threat IDs and specify the IDs of the threats for statistics collection. |
Threat type |
Select a threat type. Options are: · IPS. · Anti-virus. |
Attack type |
Select the attack types. Options are: · Attacker. · Attacked target. · All. |
Time range |
Select a time range from the list. Options are: · Today. · Past week. · Past month. · Custom. |
3. Click Start.
4. To export the threat ID-based threat trend report, click Export report.