: Botnet Report Settings
Focus
Focus

Botnet Report Settings

Table of Contents
End-of-Life (EoL)

Botnet Report Settings

  • Monitor > Botnet > Report Setting
Before generating the botnet report, you must specify the types of traffic that indicate potential botnet activity (see Configuring the Botnet Report). To schedule a daily report or run it on demand, click
Report Setting
and complete the following fields. To export a report, select it and
Export to PDF
,
Export to CSV
, or
Export to XML
.
Botnet Report Settings
Description
Test Run Time Frame
Select the time interval for the report—
Last 24 Hours
(default) or
Last Calendar Day
.
Run Now
Click
Run Now
to manually and immediately generate a report. The report displays in a new tab within the Botnet Report dialog.
No. of Rows
Specify the number of rows to display in the report (default is 100).
Scheduled
Select this option to automatically generate the report daily. By default, this option is enabled.
Query Builder
(
Optional
)
Add
queries to the Query Builder to filter the report output by attributes such as source/destination IP addresses, users, or zones. For example, if you know that traffic initiated from the IP address 192.0.2.0 contains no potential botnet activity, you can add
not (addr.src in 192.0.2.0)
as a query to exclude that host from the report output.
  • Connector
    —Select a logical connector (
    and
    or
    or
    ). If you select
    Negate
    , the report will exclude the hosts that the query specifies.
  • Attribute
    —Select a zone, address, or user that is associated with the hosts that the firewall evaluates for botnet activity.
  • Operator
    —Select an operator to relate the
    Attribute
    to a
    Value
    .
  • Value
    —Enter a value for the query to match.

Recommended For You