Use the graphs and statistics in the Security area to analyze your appliance's security status: see what Event Names and Source IPs are attacking your network, see what Target IPs are being attacked, and view comparisons of total and blocked packets/attacks.