Fortinet black logo

Administration Guide

Threats by Hosts

Copy Link
Copy Doc ID 7885f8f7-912a-11e9-81a4-00505692583a:667617
Download PDF

In this page you can view and drill down all threats grouped by hosts. The Host can be a user name or email address (if it is available) or a device that is the target of a threat. This page displays all threats that have occurred to the user or victim host during a time period. Click the View Jobs icon or double-click an entry in the table to view the second level.

In this page you can view and drill down all threats grouped by hosts. The Host can be a user name or email address (if it is available) or a device that is the target of a threat. This page displays all threats that have occurred to the user or victim host during a time period. Click the View Jobs icon or double-click an entry in the table to view the second level.