STRM Users Guide
Creating a Report
205
Top Attackers
The Top Attackers chart displays and sorts the top attackers (IP addresses)
attacking your network or business assets.
Figure 9-4
Top Attackers (top graph) - Daily Attacker and Target Summary
Expand To Include
Using the drop-down list box, select an option to include on
the graph. Options include:
•
None
- View Objects and Network Locations are graphed
exactly as shown in the View Object tree menu. This is the
default setting.
•
Group
- Expands chart to include Groups of a Network
Location or View Object, if the high level object is
selected.
•
Leaves
- Expands chart to include Network Location
leaves or View Object if the high level object is selected.
Note:
Use this option to select only the Top of the Network
Location or a View Object, and display data for the groups, or
leaves. This is dependent also on the Graph Top Items
option.
Note:
If you select View Objects in the Graph Top Items
option, and select Expand to include Group, this expands the
chart to include the groups for the specific View Object
selected.
Table 9-8
Time Series Chart Container Details (continued)
Parameter
Description
Содержание SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - LOG MANAGEMENT ADMINISTRATION GUIDE REV 1
Страница 13: ...STRM Users Guide Assets 7 Note For more information see Chapter 8 Managing Assets...
Страница 100: ...STRM Users Guide 94 INVESTIGATING OFFENSES...
Страница 138: ......
Страница 226: ......