Professional Documents
Culture Documents
Default - Schedule Default 2017 03 09 000100
Default - Schedule Default 2017 03 09 000100
Web Usage............................................................................................................................................................... 4
Top Allowed Websites...................................................................................................................................................... 4
Top Websites by Bandwidth............................................................................................................................................. 4
Top Blocked Websites...................................................................................................................................................... 4
Top Users by Blocked Requests....................................................................................................................................... 5
Top Users by Requests.................................................................................................................................................... 5
Top Users by Bandwidth................................................................................................................................................... 5
Top Video Streaming Web Sites by Bandwidth................................................................................................................ 6
Emails....................................................................................................................................................................... 7
Top Senders by Number of Emails................................................................................................................................... 7
Top Senders by Combined Email Size............................................................................................................................. 7
Top Recipients by Number of Emails................................................................................................................................ 7
Top Recipients by Combined Email Size.......................................................................................................................... 7
Threats...................................................................................................................................................................... 8
Malware Detected............................................................................................................................................................. 8
Malware Victims................................................................................................................................................................ 8
Malware Sources.............................................................................................................................................................. 8
Malware History................................................................................................................................................................ 8
Botnet Detected................................................................................................................................................................ 8
Botnet Victims................................................................................................................................................................... 8
Botnet C&C....................................................................................................................................................................... 9
Botnet History................................................................................................................................................................... 9
Intrusions Detected........................................................................................................................................................... 9
Intrusion Victims................................................................................................................................................................ 9
Intrusion Sources.............................................................................................................................................................. 9
Intrusions Blocked............................................................................................................................................................. 9
Intrusions By Severity....................................................................................................................................................... 10
Intrusion History................................................................................................................................................................ 10
0M
2M
4M
6M
8M
10M
12M
14M
16M
18M
20M
00
0K
10K
20K
30K
40K
50K
60K
70K
80K
90K
100K
00 :0
Bandwidth
:0 0
0
01 01
:0 :0
0 0
02
Number of Sessions
02 :0
:0 0
0
03 03
:0 :0
0 0
04 04
:0 :0
0 0
05 05
:0 :0
0 0
06 06
:0 :0
0
Bandwidth and Applications
0
07 07
:0 :0
0 0
08 08
:0 :0
0 0
09 09
:0 :0
0 0
10 10
:0 :0
0 0
11 11
:0 :0
12 12
:0 :0
0 0
13 13
:0 :0
0 0
14 14
:0 :0
0 0
15 15
:0 :0
0 0
16 16
:0 :0
0 0
17 17
:0 :0
0 0
18 18
:0 :0
0 0
19 19
:0 :0
0 0
20 20
:0 :0
0 0
21 21
:0 :0
Traffic Out
0 0
22 22
:0 :0
0 0
23 23
Traffic In
:0 :0
0 0
Page 1 of 12
Traffic Statistics
Summary Stats
Total Sessions 1.1 M
Total Bytes In: 36.5 GB Out: 6.3 GB
Average Sessions Per Hour 46.8 K
Average Bytes Per Hour In: 1.5 GB Out: 270.6 MB
Most Active Hour By Sessions 2017-03-08 16:00
Total Users 1.2 K
Total Applications 441
Total Destinations 4.2 K
720
640
560
Active Users
480
400
320
240
160
80
0
0
0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
00
01
02
03
04
05
06
07
08
09
10
11
12
13
14
15
16
17
18
19
20
21
22
23
Top Destinations by Bandwidth
Hostname (or IP) Traffic Out Traffic In Sessions
google.com 2.9 GB 73.1 K
equifax.com.pe 2.8 GB 43.3 K
200.60.223.152 2.5 GB 181
23.216.5.231 2.4 GB 8.8 K
191.98.179.21 2.0 GB 17.9 K
191.98.136.14 1.7 GB 575
191.98.136.12 1.6 GB 498
c.doc-0 1.5 GB 673
191.98.136.13 1.3 GB 505
ggpht.com 1.2 GB 8.0 K
Malware Victims
# Victim Occurrence
No matching log data for this report
Malware Sources
# Malware Source Host Name Counts
No matching log data for this report
Malware History
10
6
# of Viruses
0
0
0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
00
01
02
03
04
05
06
07
08
09
10
11
12
13
14
15
16
17
18
19
20
21
22
Botnet Detected 23
Botnet Victims
# Victim Name Counts
No matching log data for this report
Botnet History
10
6
# of Botnet
0
0
0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
00
01
02
03
04
05
06
07
08
09
10
11
12
13
14
15
16
17
18
19
20
21
22
23
Intrusions Detected
# Intrusion Name Counts
No matching log data for this report
Intrusion Victims
# Intrusion Victim Counts
No matching log data for this report
Intrusion Sources
# Intrusion Source Counts
No matching log data for this report
Intrusions Blocked
# Intrusion Name Counts
No matching log data for this report
0
1
2
3
4
5
6
7
8
9
10
00
:0
0
01
:0
0
Intrusion History
02
:0
0
Intrusions By Severity
03
:0
0
04
:0
0
05
:0
0
06
:0
0
07
:0
0
08
:0
0
09
:0
0
10
:0
0
11
:0
0
Page 10 of 12
VPN Usage
Site-to-Site IPSec Tunnels by Bandwidth
# Tunnel Duration Traffic Out Traffic In
No matching log data for this report
System Events
# Event Name (Description) Severity Counts
1 Configuration changed 4
4 Application crashed 17