ECM Policy Reports

To search for and generate a report on data leak protection events captured by the log source device use the ECM Policy Real-Time Report.

Menu path: Reports > Policy Reports > ECM Policy

In addition to setting the common report options in Preparing a Real-time Report, you can select optional filter operators in the generated report.

You can select to view various options in ascending or descending order. Choose the sort order by using the drop-down menu. The default is to display the Source Device, Source Device IP, Performer Name, Parent Name, Event, Event Name, and Count.

For information on saving the generated report, see Formats for Saving a Generated Report.

ECM Policy Report - Optional Filter Operators
Option Description
Source Device Device that sent these log messages
Source Device IP IP address of the device that exercised the policy
Performer Name Name of the performer
Parent Name Name of the parent
Object Name Name of the object that was acted on
Event The type of event
Event Name Name of the event
Source Name Name of the source host device
Count Number of attacks