- Table of Contents
-
- 03-Monitor
- 01-Application analysis center
- 02-Blacklist logs
- 03-Single-packet attack logs
- 04-Scanning attack logs
- 05-Flood attack logs
- 06-WAF logs
- 07-Threat logs
- 08-Reputation logs
- 09-URL filtering logs
- 10-File filtering logs
- 11-Security policy logs
- 12-IPCAR logs
- 13-Sandbox logs
- 14-Terminal status
- 15-Application audit logs
- 16-System logs
- 17-Configuration logs
- 18-Traffic logs
- 19-TopN traffic
- 20-Security policy hit analysis
- 21-TopN threats
- 22-TopN URL filtering statistics
- 23-TopN file filtering statistics
- 24-Attack defense statistics
- 25-Connection rate ranking
- 26-TopN traffic trends
- 27-Security policy hit trend analysis
- 28-TopN threat trends
- 29-TopN URL filtering trends
- 30-TopN file filtering trends
- 31-Botnet analysis
- 32-Asset security
- 33-Threat case management
- 34-Report settings
- 35-Session list
- 36-User information center
- 37-IPv4 online users
- 38-IPv6 online users
- 39-MAC authentication online users
- 40-Terminal status
- Related Documents
-
Title | Size | Download |
---|---|---|
32-Asset security | 23.55 KB |
Asset security
This help contains the following topics:
· Appendix
Introduction
The device analyses health status of downstream hosts and supports displaying the number of compromised hosts and security event distribution in graphs and tables. You can view a summary on the security status of downstream hosts, and a detailed security analysis report for a single host. Thus, you can take prevention actions based asset security information.
Restrictions and guidelines
· Support for this feature depends on the device model.
· The detailed security analysis report for a single host displays only the statistics over the past half year.
· The device generates detailed security analysis reports only for the hosts at the Controlled risk level or higher.
Configure asset security
1. Click the Monitor tab.
2. In the navigation pane, select Asset Security.
The page displays security summary of hosts on the Hosts at risk tab. For information about risk levels, see "Appendix."
3. To view the detailed security analysis report for a single host, click the host name in the table.
Appendix
Table 1 Risk level description
Risk level |
Description |
Vulnerable |
A vulnerability exists on a host. |
Attacked |
Malicious attacks are present and not blocked. For example, a host might be attacked by DDoS attacks, SQL injection attacks, worm attacks, Web shells, or has received ransomware or bots. |
Controlled |
Communication exists between an infected host and a C&C server. |
Spread |
An infected host has sent threats to other hosts. |
Damaged |
A file on an infected host has been leaked, or an infected host has been attacked by ransomware or has been forced to run mining software. |