GMS Reports and Corresponding Syslog Categories Table 68. Report categories Report Category Report Title Syslog Category Data Usage Summary Network Traffic Timeline Network Traffic Top Initiators Network Traffic Top Responders Network Traffic Top Services Network Traffic Data Usage Details Network Traffic Applications Summary Network Traffic Data Usage Network Traffic Top Applications Detected Network Traffic Top Applications Blocked Network Traffic Top Categories Network Traffic Top Initiators Network Traffic Timeline Network Traffic User Activity User Activity Details Network Traffic Web Activity Summary Network Traffic Top Categories Network Traffic Top Sites Network Traffic Top Initiators Network Traffic Timeline Network Traffic Web Activity Details Network Traffic Web Filter Summary Blocked Websites Top Categories Blocked Websites Top Sites Blocked Websites Top Initiators Blocked Websites Timeline Blocked Websites over time Web Filter Details Blocked Websites VPN Usage Summary Network Traffic Top VPN Policies Network Traffic Top VPN Initiators Network Traffic Top VPN Services Network Traffic Timeline Network Traffic Intrusions Detected Intrusion Prevention Targets Intrusion Prevention Timeline Intrusion Prevention Gateway Viruses Top Viruses Blocked Attacks Top Targets Attacks Top Initiators Attacks Timeline Attacks Spyware Top Spyware Blocked Intrusion Prevention Top Targets Intrusion Prevention Top Initiators Intrusion Prevention Timeline Intrusion Prevention Threats Summary Attacks, Intrusion Prevention Attacks Targets Attacks, Intrusion Prevention Top Initiators Attacks, Intrusion Prevention Timeline Attacks, Intrusion Prevention Authentication User Login Authenticated Access Admin Login Authenticated Access Failed Login Authenticated Access Analyzers Log Analyzer Syslog Up-Down Timeline GMS