03-Monitor

HomeSupportSecurityH3C SecPath F5000 FirewallConfigure & DeployConfiguration GuidesH3C Firewall Products Comware 7 Web Configuration Guide(E1196 E8371)-6W70003-Monitor
Table of Contents
Related Documents
38-TopN threat trends
Title Size Download
38-TopN threat trends 49.88 KB

TopN threat trends

 

This help contains the following topics:

·     Introduction

¡     User threat trend

¡     Application threat trend

¡     Threat type threat trend

¡     Attacker threat trend

¡     Attacked target threat trend

¡     Threat ID threat trend

Introduction

By analyzing the trends of detected threat events in various perspectives, the device generates the following types of threat trend reports to help illustrate the peak periods during which threats are most likely to happen and the time periods highly risky threats are most likely to happen:

·     User Threat Trend.

·     Application Threat Trend.

·     Threat Type Threat Trend.

·     Attacker Threat Trend.

·     Attacked Target Threat Trend.

·     Threat ID Threat Trend.

These reports help administrators adjust security policies to effectively protect the company network against threats.

On each of the preceding report configuration page, you can customize conditions such as the time range and data range for statistics collection. Then, you can generate the report and export the report as needed.

User threat trend

Perform this task to generate the user-based threat trend report and export the report.

Procedure

1.     Click Stats conditions in the top left corner of the page.

2.     Configure the statistics collection conditions.

Table 1 Statistics collection condition configuration items for the user-based threat trend report

Item

Description

User

Select Top 5 users to collect statistics only for the top 5 users.

Select Specify users and specify the users for statistics collection.

Threat type

Select the threat types. Options are:

·     IPS.

·     Anti-virus.

·     All.

Time range

Select a time range from the list. Options are:

·     Today.

·     Past week.

·     Past month.

·     Custom.

 

3.     Click Start.

4.     To export the user-based threat trend report, click Export report.

Application threat trend

Perform this task to generate the application-based threat trend report and export the report.

Procedure

1.     Click Stats conditions in the top left corner of the page.

2.     Configure the statistics collection conditions.

Table 2 Statistics collection condition configuration items for the application-based threat trend report

Item

Description

Application

Select Top 5 applications to collect statistics only for the top 5 applications.

·     Select Specify applications and specify the applications for statistics collection.

Time range

Select a time range from the list. Options are:

·     Today.

·     Past week.

·     Past month.

·     Custom.

 

3.     Click Start.

4.     To export the application-based threat trend report, click Export report.

Threat type threat trend

Perform this task to generate the threat type-based threat trend report and export the report.

Procedure

1.     Click Stats conditions in the top left corner of the page.

2.     Configure the statistics collection conditions.

Table 3 Statistics collection condition configuration items for the threat type-based threat trend report

Item

Description

Threat type

Select a threat type. Options are:

·     IPS.

·     Anti-virus.

Time range

Select a time range from the list. Options are:

·     Today.

·     Past week.

·     Past month.

·     Custom.

 

3.     Click Start.

4.     To export the threat type-based threat trend report, click Export report.

Attacker threat trend

Perform this task to generate the attacker-based threat trend report and export the report.

Procedure

1.     Click Stats conditions in the top left corner of the page.

2.     Configure the statistics collection conditions.

Table 4 Statistics collection condition configuration items for the attacker-based threat trend report

Item

Description

Attacker

Select Top 5 attackers to collect statistics only for the top 5 attackers.

·     Select Specify attackers and specify the attackers for statistics collection.

Threat type

Select the threat types. Options are:

·     IPS.

·     Anti-virus.

·     All.

Time range

Select a time range from the list. Options are:

·     Today.

·     Past week.

·     Past month.

·     Custom.

 

3.     Click Start.

4.     To export the attacker-based threat trend report, click Export report.

Attacked target threat trend

Perform this task to generate the attacked target-based threat trend report and export the report.

Procedure

1.     Click Stats conditions in the top left corner of the page.

2.     Configure the statistics collection conditions.

Table 5 Statistics collection condition configuration items for the attacked target-based threat trend report

Item

Description

Attacked target

Select Top 5 attacked targets to collect statistics only for the top 5 attacked targets.

·     Select Specify attacked targets and specify the attacked targets for statistics collection.

Threat type

Select the threat types. Options are:

·     IPS.

·     Anti-virus.

·     All.

Time range

Select a time range from the list. Options are:

·     Today.

·     Past week.

·     Past month.

·     Custom.

 

3.     Click Start.

4.     To export the attacked target-based threat trend report, click Export report.

Threat ID threat trend

Perform this task to generate the threat ID-based threat trend report and export the report.

Procedure

1.     Click Stats conditions in the top left corner of the page.

2.     Configure the statistics collection conditions.

Table 6 Statistics collection condition configuration items for the threat ID-based threat trend report

Item

Description

Threat ID

Select Top 5 threat IDs to collect statistics only for the top 5 threats.

Select Specify threat IDs and specify the IDs of the threats for statistics collection.

Threat type

Select a threat type. Options are:

·     IPS.

·     Anti-virus.

Attack type

Select the attack types. Options are:

·     Attacker.

·     Attacked target.

·     All.

Time range

Select a time range from the list. Options are:

·     Today.

·     Past week.

·     Past month.

·     Custom.

 

3.     Click Start.

4.     To export the threat ID-based threat trend report, click Export report.

  • Cloud & AI
  • InterConnect
  • Intelligent Computing
  • Security
  • SMB Products
  • Intelligent Terminal Products
  • Product Support Services
  • Technical Service Solutions
All Services
  • Resource Center
  • Policy
  • Online Help
All Support
  • Become a Partner
  • Partner Resources
  • Partner Business Management
All Partners
  • Profile
  • News & Events
  • Online Exhibition Center
  • Contact Us
All About Us
新华三官网