Virus Reports
The Virus Reports section includes reports that show details
on viruses that have been identified by the firewall. These reports help in
identifying the top viruses and worms that have affected the network, analyze
the extent of damage, and also track the source of the attack.
On the top right side of the Report screen, there will be three combo boxes. They are:
- Top 5
- Filter by
- Export as
Top 5
The Top 5 combo box lets you choose the level of detail in the reports. By default, the top five values are shown. To show more than 15 values, the
report uses only tables. There is an option to display the Graph only.
- Top 5 (graph & table)
- Top 10 (graph & table)
- Top 15 (table only)
- Top 20 (table only)
- Top 25 (table only)
- Graph only
Below each graph click the Hide Table link to hide the
table. Click the Show Table link to see the table again.
Filter by
The Filter by combo box lets you choose the field of filter in the reports. There will be three field values for filtering. They are:
- Source
- Destination
- Protocol
- Summary
Export as
The Export as combo box lets you choose the format of the reports for export. There will be two formats for exporting. They are:
Click on the PDF to export this report to PDF. Click on the CSV to export this report to CSV format (comma separated values).
The Top Virus Sending Hosts report shows the top source IP
addresses or host names from which viruses have been sent, along with the protocol
used to send the virus. The Top Virus Affected Hosts report
shows the top destination IP addresses or host names that have been affected
by viruses, along with the protocol that was used to receive the virus.
Drill down from these graphs to see the following details:
Field |
Description |
Virus |
The name of the virus that was sent or received |
Destination/ Host |
The destination host or IP address to which the virus was sent/
The host or IP address that sent the virus |
Severity |
The severity level of the virus, as defined by the firewall |
File |
The name of the virus file that was sent or received |
Hits |
The number of times the virus was sent to or received by the same host |
Subtype |
The subtype of the virus, as defined by the firewall |
Time |
The timestamp when the virus was sent or received |
Message |
The virus message generated by the firewall |
The Top Protocols Used By Viruses report shows the
top protocols used by each virus. The Top Viruses By Priority
report shows the top severities with which viruses have been sent.
Drill down from these graphs to see the following details:
Field |
Description |
Host |
The host or IP address that sent the virus |
Destination |
The destination host or IP address to which the virus was sent |
Severity/ Protocol |
The severity level of the virus, as defined by the firewall/
The protocol used to send the virus |
File |
The name of the virus file that was sent or received |
Hits |
The number of times the virus was sent to or received by the same host |
Subtype |
The subtype of the virus, as defined by the firewall |
Time |
The timestamp when the virus was sent or received |
Message |
The virus message generated by the firewall |
The Top Virus Files report shows the top virus files
that have been sent. The Top Virus with Status report
shows the status of the Top Virus. Drill down from these graphs to see
the following details:
Field |
Description |
Virus |
The name of the virus that sent this file |
Host |
The host or IP address that sent the virus file |
Destination |
The destination host or IP address to which the virus file was sent |
Protocol |
The protocol used by the virus to send this virus file |
Severity |
The severity level of the virus, as defined by the firewall |
Hits |
The number of times the virus file was sent to the same host |
Subtype |
The subtype of the virus, as defined by the firewall |
Time |
The timestamp when the virus file was sent |
Message |
The virus message generated by the firewall |
The Top Virus Generator report shows the
source of generation for each virus and their distinct targets.
Drill down from these graphs to see the following details:
Field |
Description |
Host |
The host or IP address that generates the virus |
Distinct targets |
The destination system or machine to which the virus was distinctly targetted at. |
|