Threat Management Reports
To search for and generate reports on information about threat management, use the Threat Management reports.
Choose Reports > Threat Management from the navigation menu.
| Report | Description | More information |
|---|---|---|
| IDS/IPS Activity | Use the IDS/IPS Activity screen to search for and generate a report on all attack activities from Intrusion Detection/Prevention Systems (IDS/IPS). | IDS/IPS Activity Reports |
| Threat Activity | Use the Threat Activity screen to search for and generate a report on threats detected, eliminated, quarantined, and detected but unable to be mitigated. | Threat Activity Reports |
| Configuration Activity | Use the Configuration Activity screen to search for and generate a report on the following data; signature file installed, software update, configuration loaded. | Configuration Activity Reports |
| Scan Activity | Use the Scan Activity screen to search for and generate a report on the following data; scan delayed, scan aborted. | Scan Activity Reports |
| Security Summary | Use the Security Summary screen to search for and generate a report on summarized user and computer activity alongside other product’s security interactions. | Security Summary Reports |
| DB IPS Activity | Use the DB IPS Activity screen to search for and generate a report on data (such as username, client/server IP addresses, so on) for various database intrusion prevention events. | DB IPS Activity Reports |
| HIPS Activity | Use the
HIPS Activity screen to search for and generate a report on alerts from IPS/IDS signatures, DDOS attacks and port scan occurrences.
See for more details. |
HIPS Activity Reports |
Preparing a Real-time Report includes the common options that you specify for Real-Time Reports.
For information on saving the generated report, see Formats for Saving a Generated Report.
Subtopics