0% found this document useful (0 votes)
33 views

Report Types

This document analyzes network usage data across multiple categories: Protocol usage, top websites and file types accessed, user activity and blocking, daily and monthly trends. Specific metrics reported on include hits, bandwidth usage, and blocked sites/categories. Security-related metrics include hits on malicious and phishing sites, as well as spyware infections. Usage is also analyzed for productivity tools, bandwidth consumption including P2P, and legal liability such as adult content access.

Uploaded by

tuancoi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
33 views

Report Types

This document analyzes network usage data across multiple categories: Protocol usage, top websites and file types accessed, user activity and blocking, daily and monthly trends. Specific metrics reported on include hits, bandwidth usage, and blocked sites/categories. Security-related metrics include hits on malicious and phishing sites, as well as spyware infections. Usage is also analyzed for productivity tools, bandwidth consumption including P2P, and legal liability such as adult content access.

Uploaded by

tuancoi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 2

A.

General
1) Protocol Group
2) Protocol Group
3) Top 15 Categories
4) Top 15 Categories
5) Bandwidth Analysis
6) Protocol Analysis
7) Protocol Analysis
8) File Type download
9) File Type download
10)User Access
11)User Access
12)Hits by Day
13)Most accessed websites
14)Which users are blocked the most
15)Which websites are blocked the most
16)Which categories are blocked the most
17)Which categories are blocked the most

-hits
- bandwidth
- hits
- bandwidth
- bandwidth
- hits
- bandwidth
- hits
- bandwidth
- hits
- bandwidth
- hits
- hits
- hits
- bandwidth

B. Security
1) Security Risk
2) Top accessed sites in Security PG
3) Security PG by Banwidth
4) Malicious Sites
5) Spyware sites
6) Spyware infected computers
7) Phishing and Fraudulent Sites
8) Hacking Sites
9) Proxy Avoidance
10)Proxy Avoidance by Users

hits
hits
bandwidth
hits
hits

- hits
- hits
- hits

C. Legal Liability
1) Adult Material Sites
2) Top 10 Users to Adult Material sites

- hits

D. Productivity
1)
2)
3)
4)
5)

IM access
IM attachments
- bandwidth
Which users have the most hits
Top users accessing Entertainment, Shopping and Sports
Which users spent the most time online

E. Bandwidth
1) Top Bandwidth Usage categories
- bandwidth
2) P2P
- bandwidth
3) Which users are consuming the most bandwidth
F. Trend Reports
1) Daily website hits in a month
2) Bandwidth usage daily in a month
3) Browse time usage daily in a month

You might also like