• 网络与数据中心管理
  • 服务器与应用性能管理
  • IT服务管理
  • Windows AD域管理
  • 终端管理
  • IT安全
  • MSP
  • IT运维平台
 
 
应用性能管理(APM)
保证物理、虚拟、云环境的应用性能
 
 
简化终端设备管理
全面管控PC计算机、智能手机以及平板电脑,确保网络安全
 
 
IT运维外包服务工具
多租户模式,为您的客户提供更好的服务
IT运维管理平台
统一监控、集中运维
 

Virus, Attack, Security, and Spam Reports

Virus, Attack, Security, and Spam Reports from Firewall Logs

Detailed Security, Virus, Attack and Spam Analysis

Firewall Analyzer includes instant reports on viruses, attacks and security breach in your network. These reports instantly show you the viruses active on the network, the hosts that have been affected, and more. With these reports it is easier for IT to do business risk assessment, detect problems and resolve them as soon as they are found.

Security Reports

Security reports give detailed information on possible security threats to the network. Reports include information on top denied hosts, denied protocols, and top security events generated. These reports give more insight into possible security threats, and help IT determine if security policies across the network need to be revised.

Virus Reports

Virus reports give in-depth information on virus attacks, hosts infected, severity of the attack, subtype, and more. With drillable details to the raw log level on top viruses and top protocols used by viruses, the complete details of the virus related raw log is available. The raw log message make troubleshooting and problem resolution faster and more efficient.

Attack Reports

Attack reports give detailed information on possible network attacks, peer-to-peer attacks, etc. Reports include information on top attackers, top targets, protocols used for the attack, etc. Top attackers report distinguishes between two scenario like, one user attacking large number of hosts (say 1000) with particular type of attack and one user attacking a single host with large number (say 1000) of particular type of attack. These reports gives the IT administrators with insight to counter such attacks.

Spam Reports

Spam reports give detailed information on spam activity in the netwrok. Reports include information on top spam generators, top spam receivers, and top rules allowing spam. These reports give more insight into possible spam threats, and help IT department control the spam activity across the network.

展开