Security Summary Reports

To search for and generate a report on all summarized user and computer activity alongside other product’s security interactions, use the Security Summary Real-Time Report.

Menu path: Reports > Threat Management > Security Summary

For this report, you can select to view various options in the generated report for your appliance. Optional filter operators can be sorted in Ascending or Descending order. Choose sort order using the drop-down menu. The default is to display only Source Device, Source IP, Destination IP, User, and Count.

For information on saving the generated report, see Formats for Saving a Generated Report.

Security Summary Report - Optional Filter Operators
Option Description
Source Device Source device that sent these log messages
Source IP IP address from which the attack originated
Destination IP IP address that was targeted
Source Port Port from which the attack originated
Destination Port Port that was targeted
User User who is making the inquiry
Source Host Host from which the attack originated
Destination Host Host that was targeted
Type Type of connection
Event Type of event
Action An action associated with the entry type
Status Status of the connection
Count Number of attacks.