Home » Firewall Reports » Virus Reports

Virus Reports


 

The Virus Reports section includes reports that show details on viruses that have been identified by the firewall. These reports help in identifying the top viruses and worms that have affected the network, analyze the extent of damage, and also track the source of the attack.

 

On the top right side of the Report screen, there will be three combo boxes. They are:

  • Top 5
  • Filter by
  • Export as

Top 5

 

The Top 5 combo box lets you choose the level of detail in the reports. By default, the top five values are shown. To show more than 15 values, the report uses only tables. There is an option to display the Graph only.

  • Top 5 (graph & table)
  • Top 10 (graph & table)
  • Top 15 (table only)
  • Top 20 (table only)
  • Top 25 (table only)
  • Graph only

Below each graph click the Hide Table link to hide the table. Click the Show Table link to see the table again.

 

Filter by

 

The Filter by combo box lets you choose the field of filter in the reports. There will be three field values for filtering. They are:

  • Source
  • Destination
  • Protocol
  • Summary

Export as

 

The Export as combo box lets you choose the format of the reports for export. There will be two formats for exporting. They are:

  • PDF
  • CSV

Click on the PDF to export this report to PDF. Click on the CSV to export this report to CSV format (comma separated values).

 

The Top Virus Sending Hosts report shows the top source IP addresses or host names from which viruses have been sent, along with the protocol used to send the virus. The Top Virus Affected Hosts report shows the top destination IP addresses or host names that have been affected by viruses, along with the protocol that was used to receive the virus.

 

Drill down from these graphs to see the following details:

 

Field Description
Virus The name of the virus that was sent or received
Destination/ Host The destination host or IP address to which the virus was sent/
The host or IP address that sent the virus
Severity The severity level of the virus, as defined by the firewall
File The name of the virus file that was sent or received
Hits The number of times the virus was sent to or received by the same host
Subtype The subtype of the virus, as defined by the firewall
Time The timestamp when the virus was sent or received
Message The virus message generated by the firewall

 

 

The Top Protocols Used By Viruses report shows the top protocols used by each virus. The Top Viruses By Priority report shows the top severities with which viruses have been sent.

Drill down from these graphs to see the following details:

 

Field Description
Host The host or IP address that sent the virus
Destination The destination host or IP address to which the virus was sent
Severity/ Protocol The severity level of the virus, as defined by the firewall/
The protocol used to send the virus
File The name of the virus file that was sent or received
Hits The number of times the virus was sent to or received by the same host
Subtype The subtype of the virus, as defined by the firewall
Time The timestamp when the virus was sent or received
Message The virus message generated by the firewall

 

 

The Top Virus Files report shows the top virus files that have been sent. The Top Virus with Status report shows the status of the Top Virus. Drill down from these graphs to see the following details:

 

Field Description
Virus The name of the virus that sent this file
Host The host or IP address that sent the virus file
Destination The destination host or IP address to which the virus file was sent
Protocol The protocol used by the virus to send this virus file
Severity The severity level of the virus, as defined by the firewall
Hits The number of times the virus file was sent to the same host
Subtype The subtype of the virus, as defined by the firewall
Time The timestamp when the virus file was sent
Message The virus message generated by the firewall

 

The Top Virus Generator report shows the source of generation for each virus and their distinct targets.

Drill down from these graphs to see the following details:

 

Field Description
Host The host or IP address that generates the virus
Distinct targets The destination system or machine to which the virus was distinctly targetted at.

 

 

Copyright © 2014, ZOHO Corp. All Rights Reserved.
ManageEngine