Threat Management Reports

To search for and generate reports on information about threat management, use the Threat Management reports.

Choose Reports > Threat Management from the navigation menu.

Threat Management Reports
Report Description More information
IDS/IPS Activity Use the IDS/IPS Activity screen to search for and generate a report on all attack activities from Intrusion Detection/Prevention Systems (IDS/IPS). IDS/IPS Activity Reports
Threat Activity Use the Threat Activity screen to search for and generate a report on threats detected, eliminated, quarantined, and detected but unable to be mitigated. Threat Activity Reports
Configuration Activity Use the Configuration Activity screen to search for and generate a report on the following data; signature file installed, software update, configuration loaded. Configuration Activity Reports
Scan Activity Use the Scan Activity screen to search for and generate a report on the following data; scan delayed, scan aborted. Scan Activity Reports
Security Summary Use the Security Summary screen to search for and generate a report on summarized user and computer activity alongside other product’s security interactions. Security Summary Reports
DB IPS Activity Use the DB IPS Activity screen to search for and generate a report on data (such as username, client/server IP addresses, so on) for various database intrusion prevention events. DB IPS Activity Reports
HIPS Activity Use the HIPS Activity screen to search for and generate a report on alerts from IPS/IDS signatures, DDOS attacks and port scan occurrences.

See for more details.

HIPS Activity Reports

Preparing a Real-time Report includes the common options that you specify for Real-Time Reports.

For information on saving the generated report, see Formats for Saving a Generated Report.