User's Guide

Table Of Contents
Data Collector Types
48 of 218
Target
Sub-
Target Bases Traffic Used
Threat Bytes
Flows
Application Response
Time
Network Response
Time
Received Bytes
Sent Bytes
Inbound Flows
Outbound Flows
In-Network
Flows
Threat Threat
End-
System
Pair
Bytes
Flows
Application Response
Time
Network Response
Time
Received Bytes
Sent Bytes
Inbound Flows
Outbound Flows
In-Network
Flows
Server Bytes
Received Bytes
Transmitted Bytes
Flows
Receive Flows
Transmit Flows
Network Response
Time
Application Response
Time
All Flows
Application Device
Family
Bytes
Flows
Clients
In-Network
Flows
Application Profile Bytes
Flows
Clients
In-Network
Flows