Policy Reports

To search for and generate reports on information about policies that were exercised on a log source, use Policy reports.

The Report Information tab that appears when you click on Reports > Policy Reports lists which reports are available for each log source.

Choose Reports > Policy Reports > report-name from the navigation menu, where report-name is one of:

Policy Reports
Report Reports Provide More information
Check Point Policies The Check Point Policies report lists current Check Point Firewall policy rules on log sources connected to your Appliance. Check Point Policies Reports
Network Policies Use the Network Policies screen to search for and generate a report on the number of times a particular network policy has been exercised by a selected firewall device. Network Policies Reports
Rules/Policies Use the Rules/Policies screen to search for and generate a report on enforcement of a particular rule or policy by a selected firewall device. Rules/Policies Reports
ECM Policy Use the ECM Policy screen to search for and generate a report on data leak protection events captured by the log source device. ECM Policy Reports

Preparing a Real-time Report includes the common options that you specify for all Real-Time Reports.

Optional filter operators are different for each Event Logs report, and explained in their respective sections.

For information on saving the generated report, see Formats for Saving a Generated Report. s