Viewing Top Hosts


 

The Top N Reports section in the Reports tab, lists the top hosts, users, and processes generating important events. You can click the View All link to view all the reports in this section in a single page.

Top Hosts by User Access

This report shows the hosts with maximum number of successful logins, and the hosts with maximum number of failed login attempts. While the former is useful in tracking usage trends of hosts, the latter is important in analyzing which hosts are subject to the most number of security breaches.

 

Using this report, you can decide if security policies need to be changed with respect to certain hosts, and even tighten security measures across the network.

 

Top Users by Login

This report shows the users with maximum number of successful logins, and the users with maximum number of failed login attempts. This report tells you which user logged into which host, using his password, and whether he was successful or not.

 

If a user has been accessing several hosts with his user name and password, this report will show you which hosts were used, and when. If the user has tried to log in, but was unsuccessful, this report will show you how many times he was unsuccessful, on which hosts did he try, and when.

 

Using this report, you can identify errant users on the network, and set up security policies to track such users.

 

Top Interactive Login

In this case, only the logins done interactively through the UI. This report shows the users with maximum number of successful logins, and the users with maximum number of failed login attempts. This report tells you which user logged into which host, using his password, and whether he was successful or not.

 

If a user has been accessing several hosts with his user name and password, this report will show you which hosts were used, and when. If the user has tried to log in, but was unsuccessful, this report will show you how many times he was unsuccessful, on which hosts did he try, and when.

 

Using this report, you can identify errant users on the network, and set up security policies to track such users.

 

Top Hosts by Event Severity

This report sorts event logs received from all hosts by severity, and shows the top values for each event severity. This means that, at one glance, you can see which hosts have been generating maximum number of critical events, warning events, and so on. By default, the overall top hosts generating events of any severity, is shown, with the View Severity value set to All.

 

Using this report, you can quickly see hosts that may be experiencing problems, thereby accelerating the troubleshooting process.

 

note Some event severities are applicable to Unix hosts only

 

Top Processes by Event Severity

This report sorts event logs generated by processes running across all hosts, and shows the top values for each event severity. This means that, at one glance, you can see which processes have been generating maximum number of critical events, warning events, and so on. By default, the overall top processes generating events of any severity, is shown, with the View Severity value set to All.

 

Using this report, you can investigate suspicious behavior on critical hosts, determine if there has been a worm or virus attack in the network, and also see which hosts have been affected, thereby reducing network downtime.

 

Copyright © 2012, ZOHO Corp. All Rights Reserved.
ManageEngine