Fortinet white logo
Fortinet white logo

Administration Guide

Threats by Hosts - level 2

Threats by Hosts - level 2

Double-click an entry in the table or click the View Jobs icon to view the second level.

The following information is displayed:

Back

Click Back button to return to the main landing page.

Threat Timeline Chart

This chart displays the number of threats and types of threats which occurred to the threat target during the period of time. Hover the mouse pointer over the dots in the chart and more detailed threat information will be displayed.

Summary

The following fields are displayed: Device, Threat Target, Time Period, Total Files, number of: Malicious Files, Suspicious Files, and Network Events.

Details

Malicious Files

Malicious file information including malware name, Threat Source, and number of detection times. The options are:

  • Click the View Jobs icon to drill down the entry.
  • Click the malware name to view the related FortiGuard Encyclopedia page.

Suspicious Files

Suspicious file information including file name, file type, rating, the malware hosting address and number of detection times. Click the View Jobs icon to drill down the entry.

Attacker Events

Attacker event information including backdoor name, attack origin address and port, attack destination address and port, and number of detection times.

Botnet Events

Botnet event information including botnet name, user IP address, user port, destination IP address, destination IP port and number of detection times.

URL Events

Suspicious URL event information including site category, host or IP address, URL, type, user IP address, user port and number of detection times.

Threats by Hosts - level 2

Threats by Hosts - level 2

Double-click an entry in the table or click the View Jobs icon to view the second level.

The following information is displayed:

Back

Click Back button to return to the main landing page.

Threat Timeline Chart

This chart displays the number of threats and types of threats which occurred to the threat target during the period of time. Hover the mouse pointer over the dots in the chart and more detailed threat information will be displayed.

Summary

The following fields are displayed: Device, Threat Target, Time Period, Total Files, number of: Malicious Files, Suspicious Files, and Network Events.

Details

Malicious Files

Malicious file information including malware name, Threat Source, and number of detection times. The options are:

  • Click the View Jobs icon to drill down the entry.
  • Click the malware name to view the related FortiGuard Encyclopedia page.

Suspicious Files

Suspicious file information including file name, file type, rating, the malware hosting address and number of detection times. Click the View Jobs icon to drill down the entry.

Attacker Events

Attacker event information including backdoor name, attack origin address and port, attack destination address and port, and number of detection times.

Botnet Events

Botnet event information including botnet name, user IP address, user port, destination IP address, destination IP port and number of detection times.

URL Events

Suspicious URL event information including site category, host or IP address, URL, type, user IP address, user port and number of detection times.