Fortinet white logo
Fortinet white logo

Administration Guide

Threats by Hosts

Threats by Hosts

In this page you can view and drill down all threats grouped by hosts. The Host can be a user name or email address (if it is available) or a device that is the target of a threat. This page displays all threats that have occurred to the user or victim host during a time period. Click the View Jobs icon or double-click an entry in the table to view the second level.

Threats by Hosts

Threats by Hosts

In this page you can view and drill down all threats grouped by hosts. The Host can be a user name or email address (if it is available) or a device that is the target of a threat. This page displays all threats that have occurred to the user or victim host during a time period. Click the View Jobs icon or double-click an entry in the table to view the second level.