- Table of Contents
-
- 03-Monitor
- 01-Application analysis center
- 02-Blacklist logs
- 03-Single-packet attack logs
- 04-Scanning attack logs
- 05-Flood attack logs
- 06-WAF logs
- 07-Threat logs
- 08-Reputation logs
- 09-URL filtering logs
- 10-File filtering logs
- 11-Security policy logs
- 12-IPCAR logs
- 13-Sandbox logs
- 14-Terminal status
- 15-Application audit logs
- 16-System logs
- 17-Configuration logs
- 18-Traffic logs
- 19-TopN traffic
- 20-Security policy hit analysis
- 21-TopN threats
- 22-TopN URL filtering statistics
- 23-TopN file filtering statistics
- 24-Attack defense statistics
- 25-Connection rate ranking
- 26-TopN traffic trends
- 27-Security policy hit trend analysis
- 28-TopN threat trends
- 29-TopN URL filtering trends
- 30-TopN file filtering trends
- 31-Botnet analysis
- 32-Asset security
- 33-Threat case management
- 34-Report settings
- 35-Session list
- 36-User information center
- 37-IPv4 online users
- 38-IPv6 online users
- 39-MAC authentication online users
- 40-Terminal status
- Related Documents
-
Title | Size | Download |
---|---|---|
34-Report settings | 18.01 KB |
Report settings
Introduction
The device can collect and analyze data of various services to generate the following types of reports:
· Summary report—Displays summarized service statistics collected over a time range.
· Comparison report—Provides comparison of service statistics collected over two time ranges that contain the same number of days.
· Intelligent report—Provides intelligent analysis of users' work efficiency, data leakage, and turnover risks based on their network access behaviors.
· Comprehensive report—Illustrates the overall device operational and network security status based on analysis of critical service statistics.