How to analyze Network Threat Protection reports and logs
About the information in the Network Threat Protection reports and logs
Report or log | Typical uses |
Top Targets Attacked | Use this report to identify which groups, subnets, computers, or ports are attacked most frequently. You may want to take some action based on this report. For example, you might find that the clients that attach through a VPN are attacked much more frequently. You might want to group those computers so that you can apply a more stringent security policy. |
Top Sources of Attack | Use this report to identify which hosts attack your network most frequently. |
Top Types of Attack | Use this report to identify the types of attack that are directed at your network most frequently. The possible types of attack that you can monitor include port scans, denial-of-service attacks, and MAC spoofing. |
Top Blocked Applications Blocked Applications Over Time |
Use these reports together to identify the applications that are used most frequently to attack your network. You can also see whether or not the applications being used for attacks have changed over time. |
Attacks over Time | Use this report to identify the groups, IP addresses, operating systems, and users that are attacked most frequently in your network. Use it to also identify the most frequent type of attack that occurs. |
Security Events by Severity | Use this report to see a summary of the severity of security events in your network. |
Top Traffic Notifications Traffic Notifications Over Time |
These reports show the number of attacks that violated the firewall rules that you configured to notify you about violations. You configure this data to be reported by checking the Send Email Alert option in the Logging column of the Firewall Policy Rules. Use Traffic Notifications Over Time to see how the attacks increase or decrease or affect different groups over time. Use them to see which groups are most at risk of attack through the firewall. |
Full Report | Use this report to see the information that appears in all the Network Threat Protection quick reports in one place. |
Traffic log | Use this log if you need more information about a specific traffic event or type of traffic that passes through your firewall. |
Packet log | Use this log if you need more information about a specific packet. You may want to look at packets to more thoroughly investigate a security event that was listed in a report. |
Attacks log | Use this log if you need more detailed information about a specific attack that occurred. |
References
2009081409151448 - About the different types of Symantec Endpoint Protection Manager Reports