Botnets/Trojan Horses/Worms Log

Prerequisites

The function of detecting Botnets, Trojan horses, and worms is enabled.

Function

Botnets/Trojan Horses/Worms Log records basic information about the detected Botnets, Trojan horses, and worms.

Parameter

Table 1 Query parameters of Botnets/Trojan horses/Worms Log
Parameter Description

NE

Selects an NE from the drop-down list.

Zone

Click , select a Zone on the Zone page that is displayed, and then click OK.

Type

Selects the Botnet/Trojan horse/worm type.

Name

Enters the Botnet/Trojan horse/worm name.

Source IP Address

Enters the source IP address of the Botnet/Trojan horse/worm attack.

Bothe IPv4 and IPv6 addresses are applicable.

Destination IP Address

Enters the destination IP address of the Botnet/Trojan horse/worm attack.

Bothe IPv4 and IPv6 addresses are applicable.

Time

Click to select the start time and end time of statistics. Or you can change the time values in corresponding text boxes.

The end time should be later than the start time and the interval cannot be longer than one year.

Example

If the NE is set to bj (Cleaning) and type to worm, the Botnets/Trojan horses/Worms log within a period of time is displayed in Figure 1.

Figure 1 Botnets/Trojan horses/Worms Log

Procedure

  1. Choose Report > Report > Botnets/Trojan horses/Worms Analysis.
  2. Click the Botnets/Trojan horses/Worms Log tab.
  3. Set query parameters.
  4. Click Search.

    Botnets/Trojan horses/Worms logs that meet search conditions are displayed.

  5. Optional: Open or save the query results as files, or send queried reports to the specified email address.

    • Click to open or save the query results as PDF files. A maximum of 10,000 entries can be displayed.
    • Click to open or save the query results as EXCEL files. A maximum of 10,000 entries can be displayed.
    • Click to open or save the query results as CSV files. All data except figures can be displayed.
    • Click to enter a recipient mail address and select an attachment format. Then click OK.


Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.