03-Monitor

HomeSupportSecurityH3C SecPath F5000 FirewallConfigure & DeployConfiguration GuidesH3C Firewall Products Comware 7 Web Configuration Guide(E1196 E8371)-6W70003-Monitor
Table of Contents
Related Documents
27-TopN threats
Title Size Download
27-TopN threats 49.93 KB

TopN threats

 

This help contains the following topics:

·     Introduction

¡     TopN users

¡     TopN applications

¡     TopN threat types

¡     TopN attackers

¡     TopN attacked targets

¡     TopN threat names

Introduction

The device analyzes detected threat events (including IPS events and anti-virus events) and generates the following types of threat ranking reports:

·     TopN Users.

·     TopN Applications.

·     TopN Threat Types.

·     TopN Attackers.

·     TopN Attacked Targets.

·     TopN Threat Names.

These threat ranking reports help administrators customize IPS profiles and anti-virus profiles to improve network security.

On each of the preceding report configuration page, you can customize conditions such as the time range for statistics collection and the number of items to display. Then, you can generate the report and export the report as needed.

TopN users

The TopN Users page displays the topN users by the number of threats they are involved in.

Perform this task to generate the topN users threat report and export the report.

Procedure

1.     Click Stats conditions in the top left corner of the page.

2.     Configure the statistics collection conditions.

Table 1 Statistics collection condition configuration items for the topN users threat report

Item

Description

Time range

Select a time range from the list. Options are:

·     Today.

·     Past week.

·     Past month.

·     Custom.

Show Top

Enter the number of users to display.

 

3.     Click Start.

4.     To export the topN users threat report, click Export report.

TopN applications

The TopN Applications page displays the topN applications by the number of threats they are involved in.

Perform this task to generate the topN applications threat report and export the report.

Procedure

1.     Click Stats conditions in the top left corner of the page.

2.     Configure the statistics collection conditions.

Table 2 Statistics collection condition configuration items for the topN applications threat report

Item

Description

Time range

Select a time range from the list. Options are:

·     Today.

·     Past week.

·     Past month.

·     Custom.

Show Top

Enter the number of applications to display.

 

3.     Click Start.

4.     To export the topN applications threat report, click Export report.

TopN threat types

The TopN Threat Types page displays the topN types of the most common threats detected by the device.

Perform this task to generate the topN threat types threat report and export the report.

Procedure

1.     Click Stats conditions in the top left corner of the page.

2.     Configure the statistics collection conditions.

Table 3 Statistics collection condition configuration items for the topN threat types threat report

Item

Description

Time range

Select a time range from the list. Options are:

·     Today.

·     Past week.

·     Past month.

·     Custom.

Show Top

Enter the number of threat types to display.

 

3.     Click Start.

4.     To export the topN threat types threat report, click Export report.

TopN attackers

The TopN Attackers page displays the IP addresses of the topN attackers by the number of attacks they launched.

Perform this task to generate the topN attackers threat report and export the report.

Procedure

1.     Click Stats conditions in the top left corner of the page.

2.     Configure the statistics collection conditions.

Table 4 Statistics collection condition configuration items for the topN attackers threat report

Item

Description

Time range

Select a time range from the list. Options are:

·     Today.

·     Past week.

·     Past month.

·     Custom.

Threat type

Select the types of threats for statistics collection. Options are:

·     IPS.

·     Anti-virus.

·     All.

Show Top

Enter the number of attackers to display.

 

3.     Click Start.

4.     Click an attacker IP address on the topN attackers threat report and select Threat name to view the topN threats launched by the attacker.

5.     Click an attacker IP address on the topN attackers threat report and select Attacked target to view the topN attacked targets for the attacker.

6.     To export the topN attackers threat report, click Export report.

TopN attacked targets

The TopN Attacked Targets page displays the IP addresses of the topN attacked targets by the number of threats they are involved in.

Perform this task to generate the topN attacked targets threat report and export the report.

Procedure

1.     Click Stats conditions in the top left corner of the page.

2.     Configure the statistics collection conditions.

Table 5 Statistics collection condition configuration items for the topN attacked targets threat report

Item

Description

Time range

Select a time range from the list. Options are:

·     Today.

·     Past week.

·     Past month.

·     Custom.

Threat type

Select the types of threats for statistics collection. Options are:

·     IPS.

·     Anti-virus.

·     All.

Show Top

Enter the number of attacked targets to display.

 

3.     Click Start.

4.     Click an attacked target IP address on the topN attacked targets threat report and select Threat name to view the topN threats targeted at the attacked target.

5.     Click an attacked target IP address on the topN attacked targets threat report and select Attacker to view the topN attackers for the attacked target.

6.     To export the topN attacked targets threat report, click Export report.

TopN threat names

The TopN Threat Names page displays the topN most common threats detected by the device.

Perform this task to generate the topN threat names threat report and export the report.

Procedure

1.     Click Stats conditions in the top left corner of the page.

2.     Configure the statistics collection conditions.

Table 6 Statistics collection condition configuration items for the topN threat names threat report

Item

Description

Threat type

Select the types of threats for statistics collection. Options are:

·     IPS.

·     Anti-virus.

·     All.

Time range

Select a time range from the list. Options are:

·     Today.

·     Past week.

·     Past month.

·     Custom.

Attack category

Select All, Attacker, or Attacked target.

Show Top

Enter the number of threats targets to display.

 

3.     Click Start.

4.     Click a threat on the topN threat names threat report and select Attacker to view the topN attackers for the threat.

5.     Click a threat on the topN threat names threat report and select Attacked target to view the topN attacked target for the threat.

6.     To export the topN threat names threat report, click Export report.

 

 

  • Cloud & AI
  • InterConnect
  • Intelligent Computing
  • Security
  • SMB Products
  • Intelligent Terminal Products
  • Product Support Services
  • Technical Service Solutions
All Services
  • Resource Center
  • Policy
  • Online Help
All Support
  • Become a Partner
  • Partner Resources
  • Partner Business Management
All Partners
  • Profile
  • News & Events
  • Online Exhibition Center
  • Contact Us
All About Us
新华三官网