Virus Reports
The Virus Reports section includes reports that show details on viruses that have been identified by the firewall. These reports help in identifying the top viruses and worms that have affected the network, analyze the extent of damage, and also track the source of the attack. On the top right side of the Report screen, there will be three combo boxes. They are: Top 5 The Top 5 combo box lets you choose the level of detail in the reports. By default, the top five values are shown. To show more than 15 values, the report uses only tables. There is an option to display the Graph only. - Top 5 (graph & table)
- Top 10 (graph & table)
- Top 15 (table only)
- Top 20 (table only)
- Top 25 (table only)
- Graph only
Below each graph click the Hide Table link to hide the table. Click the Show Table link to see the table again. Filter by The Filter by combo box lets you choose the field of filter in the reports. There will be three field values for filtering. They are: - Source
- Destination
- Protocol
- Summary
Export as The Export as combo box lets you choose the format of the reports for export. There will be two formats for exporting. They are: Click on the PDF to export this report to PDF. Click on the CSV to export this report to CSV format (comma separated values). The Top Virus Sending Hosts report shows the top source IP addresses or host names from which viruses have been sent, along with the protocol used to send the virus. The Top Virus Affected Hosts report shows the top destination IP addresses or host names that have been affected by viruses, along with the protocol that was used to receive the virus. Drill down from these graphs to see the following details: | Field | Description |
|---|
| Virus | The name of the virus that was sent or received | | Destination/ Host | The destination host or IP address to which the virus was sent/ The host or IP address that sent the virus | | Severity | The severity level of the virus, as defined by the firewall | | File | The name of the virus file that was sent or received | | Hits | The number of times the virus was sent to or received by the same host | | Subtype | The subtype of the virus, as defined by the firewall | | Time | The timestamp when the virus was sent or received | | Message | The virus message generated by the firewall |
The Top Protocols Used By Viruses report shows the top protocols used by each virus. The Top Viruses By Priority report shows the top severities with which viruses have been sent. Drill down from these graphs to see the following details: | Field | Description |
|---|
| Host | The host or IP address that sent the virus | | Destination | The destination host or IP address to which the virus was sent | | Severity/ Protocol | The severity level of the virus, as defined by the firewall/ The protocol used to send the virus | | File | The name of the virus file that was sent or received | | Hits | The number of times the virus was sent to or received by the same host | | Subtype | The subtype of the virus, as defined by the firewall | | Time | The timestamp when the virus was sent or received | | Message | The virus message generated by the firewall |
The Top Virus Files report shows the top virus files that have been sent. The Top Virus with Status report shows the status of the Top Virus. Drill down from these graphs to see the following details: | Field | Description |
|---|
| Virus | The name of the virus that sent this file | | Host | The host or IP address that sent the virus file | | Destination | The destination host or IP address to which the virus file was sent | | Protocol | The protocol used by the virus to send this virus file | | Severity | The severity level of the virus, as defined by the firewall | | Hits | The number of times the virus file was sent to the same host | | Subtype | The subtype of the virus, as defined by the firewall | | Time | The timestamp when the virus file was sent | | Message | The virus message generated by the firewall |
The Top Virus Generator report shows the source of generation for each virus and their distinct targets. Drill down from these graphs to see the following details: | Field | Description |
|---|
| Host | The host or IP address that generates the virus | | Distinct targets | The destination system or machine to which the virus was distinctly targetted at. |
|