- Table of Contents
-
- 03-Monitor
- 01-Application analysis center
- 02-Blacklist logs
- 03-Single-packet attack logs
- 04-Scanning attack logs
- 05-Flood attack logs
- 06-Threat logs
- 07-Reputation logs
- 08-URL filtering logs
- 09-File filtering logs
- 10-Data filtering logs
- 11-Security policy logs
- 12-IPCAR logs
- 13-Sandbox logs
- 14-NAT logs
- 15-SSL VPN user access logs
- 16-SSL VPN access resource logs
- 17-Terminal status
- 18-DLP logs
- 19-Zero trust policy logs
- 20-Application audit logs
- 21-System logs
- 22-Configuration logs
- 23-Traffic logs
- 24-Load balancing logs
- 25-TopN traffic
- 26-Security policy hit analysis
- 27-TopN threats
- 28-TopN URL filtering statistics
- 29-TopN file filtering statistics
- 30-Attack defense statistics
- 31-Server load balancing statistics
- 32-Outbound link load balancing statistics
- 33-Transparent DNS proxy statistics
- 34-Connection rate ranking
- 35-DLP statistics
- 36-TopN traffic trends
- 37-Security policy hit trend analysis
- 38-TopN threat trends
- 39-TopN URL filtering trends
- 40-TopN file filtering trends
- 41-Link trend
- 42-Routing policy trends
- 43-Virtual server trend
- 44-Server farm trends
- 45-Real server trend
- 46-Domain Requested Times Trend
- 47-TopN file filtering trends
- 48-Online SSL VPN users trend
- 49-Botnet analysis
- 50-Asset security
- 51-Threat case management
- 52-Report settings
- 53-Session list
- 54-LB session information
- 55-DNS cache information
- 56-User information center
- 57-IPv4 online users
- 58-IPv6 online users
- 59-MAC authentication online users
- 60-Terminal status
- 61-Asset scan
- 62-Ping
- 63-Tracert
- 64-Packet capture
- 65-Webpage Diagnosis
- 66-Diagnostic Info
- 67-Packet trace
- 68-Load balancing test
- 69-IPsec diagnosis
- 70-Risk analysis
- 71-Content moderation logs
- 72-Content security top
- Related Documents
-
Title | Size | Download |
---|---|---|
50-Asset security | 23.65 KB |
Asset security
This help contains the following topics:
· Appendix
Introduction
The device analyses health status of downstream hosts and supports displaying the number of compromised hosts and security event distribution in graphs and tables. You can view a summary on the security status of downstream hosts, and a detailed security analysis report for a single host. Thus, you can take prevention actions based asset security information.
Restrictions and guidelines
· The detailed security analysis report for a single host displays only the statistics over the past half year.
· The device generates detailed security analysis reports only for the hosts at the Controlled risk level or higher.
Configure asset security
1. Click the Monitor tab.
2. In the navigation pane, select Asset Security.
The page displays security summary of hosts on the Hosts at risk tab. For information about risk levels, see "Appendix."
3. To view the detailed security analysis report for a single host, click the host name in the table.
Appendix
Table 1 Risk level description
Risk level |
Description |
Vulnerable |
Vulnerabilities were detected on the host. The host has not been attacked. For example, the system might have detected that vulnerable ports 138 and 139 are open on the host through vulnerability scanning. |
Attacked |
Malicious attacks were detected on the host. For example, the host might suffer DDoS attacks, SQL injection attacks, or bots. |
Controlled |
Abnormal outreach behaviors were detected on the host. For example, the host might have communicated with a C&C server or communicated with the IP, URL, or domain name associated with a known malware or worm. |
Spread |
Attacks from the host to other hosts were detected. For example, the host might have initiated port scanning and brute-force attacks to other hosts. |
Damaged |
File leakage was detected on the host, or threats to other hosts or databases were detected on the host. For example, mining and ransomware viruses might exist on the host. |