
Displays information about security threats that managed products detect: viruses, spyware/grayware, phishing sites, and more.
|
Overall Virus/Malware Summary: Displays overall summary for virus/malware detections. Example: name of virus/malware, number of clients affected by the virus, total number of instances of the virus on the network
| ||||||||||||
|
Overall Virus/Malware Type Summary: Displays broad summary for virus/malware detections. Example: type of virus/malware (Trojans, hacking tools) , number of unique viruses/malware on your network, total number of instances of viruses/malware on the network
| ||||||||||||
|
Virus/Malware Infection Source Summary: Displays summary for virus/malware detections from the source of the outbreak. Example: name of source computer, number of specific virus/malware instances from the source computer, total number of instances of viruses/malware on the network
| ||||||||||||
|
Virus/Malware Infection Destination Summary: Displays summary for virus/malware detections from specific clients. Example: name of client, number of specific virus/malware instances on the client, total number of instances of viruses/malware on the network
| ||||||||||||
|
Virus/Malware Detections Over Time Summary: Displays summary for virus/malware detections over a period of time (daily, weekly, monthly). Example: time and date of when summary data collected, number of clients affected by the virus, total number of instances of viruses/malware on the network
| ||||||||||||
|
Virus/Malware Action/Result Summary: Displays summary for the actions managed products take against viruses/malware. Example: specific actions taken against viruses/malware, the result of the action taken, total number of instances of viruses/malware on the network
|
|
Detailed Overall Virus/Malware Information: Displays overall information about the virus/malware instances on your network. Example: the managed product which detects the viruses/malware, the name of the virus/malware, the name of the client with viruses/malware
| ||||||||||||||||||||||||||||||||||||||||||
|
Virus/Malware Found in Hosts Information: Displays overall information about the virus/malware instances found on clients. Example: the managed product which detects the viruses/malware, the type of scan which detects the virus/malware, the file path on the client to detected viruses/malware
| ||||||||||||||||||||||||||||||||||||||||||
|
Virus/Malware Found in HTTP/FTP Information: Displays overall information about the virus/malware instances found in HTTP or FTP traffic. Example: the managed product which detects the viruses/malware, the direction of traffic where the virus/malware occurs, the Internet browser or FTP client which downloads the virus/malware
| ||||||||||||||||||||||||||||||||||||||||||
|
Virus/Malware Found in Email Information: Displays overall information about the virus/malware instances found in email. Example: the managed product which detects the viruses/malware, the subject line content of the email, the sender of the email which contains viruses/malware
| ||||||||||||||||||||||||||||||||||||||||||
|
Virus/Malware Found in Network Traffic Information: Displays overall information about the virus/malware instances found in network traffic. Example: the managed product which detects the viruses/malware, the protocol the virus/malware uses to enter your network, specific information about the source and destination of the virus/malware
|
|
Overall Spyware/Grayware Summary: Displays overall summary for spyware/grayware detections. Example: name of spyware/grayware, number of clients affected by the spyware/grayware, total number of instances of the spyware/grayware on the network
| ||||||||||||
|
Spyware/Grayware Source Summary: Displays summary for spyware/grayware detections from the source of the outbreak. Example: name of source computer, number of specific spyware/grayware instances from the source computer, total number of instances of spyware/grayware on the network
| ||||||||||||
|
Spyware/Grayware Destination Summary: Displays summary for spyware/grayware detections from specific clients. Example: name of client, number of specific spyware/grayware instances on the client, total number of instances of spyware/grayware on the network
| ||||||||||||
|
Spyware/Grayware Detection Over Time Summary: Displays summary for spyware/grayware detections over a period of time (daily, weekly, monthly). Example: time and date of when summary data collected, number of clients affected by the spyware/grayware, total number of instances of spyware/grayware on the network
| ||||||||||||
|
Spyware/Grayware Action/Result Summary: Displays summary for the actions managed products take against spyware/grayware. Example: specific actions taken against spyware/grayware, the result of the action taken, total number of instances of spyware/grayware on the network
|
|
Detailed Overall Spyware/Grayware Information: Displays overall information about the spyware/grayware instances on your network. Example: the managed product which detects the spyware/grayware, the name of the spyware/grayware, the name of the client with spyware/grayware
| ||||||||||||||||||||||||||||||||||||||||||
|
Spyware/Grayware Found in Hosts: Displays overall information about the spyware/grayware instances found on clients. Example: the managed product which detects the spyware/grayware, the type of scan which detects the spyware/grayware, the file path on the client to detected spyware/grayware
| ||||||||||||||||||||||||||||||||||||||||||
|
Spyware/Grayware Found in HTTP/FTP: Displays overall information about the spyware/grayware instances found in HTTP or FTP traffic. Example: the managed product which detects the spyware/grayware, the direction of traffic where the spyware/grayware occurs, the Internet browser or FTP client which downloads the spyware/grayware
| ||||||||||||||||||||||||||||||||||||||||||
|
Spyware/Grayware Found in Email: Displays overall information about the spyware/grayware instances found in email. Example: the managed product which detects the spyware/grayware, the subject line content of the email, the sender of the email which contains spyware/grayware
| ||||||||||||||||||||||||||||||||||||||||||
|
Spyware/Grayware Found in Network Traffic: Displays overall information about the spyware/grayware instances found in network traffic. Example: the managed product which detects the spyware/grayware, the protocol the spyware/grayware uses to enter your network, specific information about the source and destination of the spyware/grayware
|
|
Content Violation Policy Summary: Displays summary for content violation detections due to specific policies. Example: name of the policy in violation, the type of filter which detects the content violation, the total number of content violations on the network
| ||||||||||||
|
Content Violation Sender Summary: Displays summary for content violation detections due to specific senders. Example: name of the content sender, the number of unique content violations, the total number of content violations on the network
| ||||||||||||
|
Content Violation Detection Over Time Summary: Displays summary for content violation detections over a period of time (daily, weekly, monthly). Example: time and date of when summary data collected, number of clients affected by the content violation, total number of unique content violations and total number of content violations on the network
| ||||||||||||
|
Content Violation Action/Result Summary: Provides summary for actions managed products take against content violations. Example: the action managed products take against the content violation, the number of email affected by the action taken
|
|
Detailed Overall Content Violation Information: Displays overall information about the content violations on your network. Example: the managed product which detects the content violation, the name of the specific policy in violation, the total number of content violations on the network
|
|
Overall Spam Violation Summary: Displays summary for spam detections on specific domains. Example: name of the domain receiving spam, the number of clients receiving spam, the total number of spam violations on the network
| ||||||||||
|
Spam Recipient Summary: Displays summary for spam violations on specific clients. Example: name of client, total number of instances of viruses/malware on the client
| ||||||||||
|
Spam Detection Over Time Summary: Displays summary for spam detections over a period of time (daily, weekly, monthly). Example: time and date of when summary data collected, number of clients affected by spam, the total number of spam violations on the network
|
|
Detailed Overall Spam Information: Displays overall information about the spam violations on your network. Example: the managed product which detects the content violation, the name of the specific policy in violation, the total number of spam violations on the network
| ||||||||||||||||||||||
|
Spam Connection Information: Displays overall information about the spam violations on your network. Example: the managed product which detects the spam violation, the specific action managed products take against spam violations, the total number of spam violations on the network
|
|
Detailed Overall Firewall Rule Violation Information: Displays overall information about the firewall violations on your network. Example: the managed product which detects the firewall violation, specific information about the source and destination, the total number of firewall violations on the network
| ||||||||||||||||||||||||||||||||
|
Detailed Overall Endpoint Security Violation Information: Displays overall information about the endpoint security violations on your network. Example: the managed product which detects the Web violation, the name of the specific policy in violation, the total number of Web violations on the network
| ||||||||||||||||||||||||||||||||
|
Detailed Overall Endpoint Security Compliance Information: Displays overall information about the endpoint security compliance instances on your network. Example: the managed product which detects the security compliance, the name of the specific policy in compliance, the total number of security compliances on the network
|
|
Overall Web Violation Summary: Displays summary for Web violations of specific policies. Example: name of the policy in violation, the type of filter/blocking to stop access to the URL, the total number of Web violations on the network
| ||||||||||||
|
Web Violation Client Host Summary: Displays summary for Web violation detections from a specific client. Example: IP address of the client in violation, number of policies in violation, the total number of Web violations on the network
| ||||||||||||
|
Web Violation URL Summary: Displays summary for Web violation detections from specific URLs. Example: name of the URL causing the Web violation, the type of filter/blocking to stop access to the URL, the total number of Web violations on the network
| ||||||||||||
|
Web Violation Filter/Blocking Type Summary: Displays summary for the action managed products take against Web violations. Example: the type of filter/blocking to stop access to the URL, the total number of Web violations on the network
| ||||||||||||
|
Web Violation Detection Over Time Summary: Displays summary for Web violation detections over a period of time (daily, weekly, monthly). Example: time and date of when summary data collected, number of clients in violation, the total number of Web violations on the network
|
|
Detailed Overall Web Violation Information: Displays overall information about the Web violations on your network. Example: the managed product which detects the Web violation, the name of the specific policy in violation, the total number of Web violations on the network
|
|
Overall Suspicious Threat Summary: Displays overall information about suspicious threats on your network. Example: the rule/violation in violation, summary information about the source and destination, the total number of suspicious threats on the network
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
Suspicious Threat Source Summary: Displays summary for suspicious threat detections from a specific source. Example: name of the source, summary information about the destination and rules/violations, the total number of suspicious threats on the network
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
Suspicious Threat Riskiest Destination Summary: Displays summary for the clients with the most suspicious threat detections. Example: name of the destination, summary information about the source and rules/violations, the total number of suspicious threats on the network
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
Suspicious Threat Riskiest Recipient Summary: Displays summary for the recipients with the most suspicious threat detections. Example: name of the recipient, summary information about the senders and rules/violations, the total number of suspicious threats on the network
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
Suspicious Threat Sender Summary: Displays summary for suspicious threat detections from a specific sender. Example: name of the sender, summary information about the recipient and rules/violations, the total number of suspicious threats on the network
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
Suspicious Threat Protocol Detection Summary: Displays summary for suspicious threats detections over a specific protocol. Example: name of the protocol, summary information about the source and destination, the total number of suspicious threats on the network
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
Suspicious Threat Detection Over Time Summary: Displays summary for suspicious threats detections over a period of time (daily, weekly, monthly). Example: time and date of when summary data collected, summary information about the source and destination, the total number of suspicious threats on the network
|
|
Detailed Overall Suspicious Threat Information: Displays overall information about suspicious threats on your network. Example: the managed product which detects the suspicious threat, specific information about the source and destination, the total number of suspicious threats on the network
|
|
Complete Network Security Risk Analysis Information: Displays information for overall security risks affecting your desktops. Examples: name of the security risk, total number of security risk detections, number of clients affected
| ||||||||||||||||
|
Network Protection Boundary Information: Displays information for a broad overview of security risks affecting your entire network. Examples: managed product network protection type (gateway, email), type of security risk, number of clients affected
| ||||||||||||||||
|
Security Risk Entry Point Analysis Information: Displays information with the entry point of security risks as the focus. Examples: managed product network protection type (gateway, email, desktop), name of the security risk, time of the last security risk detection
| ||||||||||||||||
|
Security Risk Destination Analysis Information: Displays information with affected clients as the focus. Examples: name of the client, the broad range of how the security risk enters your network, number of clients affected
| ||||||||||||||||
|
Security Risk Source Analysis Information: Displays information with the security risk source as the focus. Examples: name of the security risk source, the broad range of how the security risk enters your network, number of clients affected
|