Threat Management Reports
To search for and generate reports on information about threat management, use the Threat Management reports.
Choose
from the navigation menu.Report | Description | More information |
---|---|---|
IDS/IPS Activity | Use the IDS/IPS Activity screen to search for and generate a report on all attack activities from Intrusion Detection/Prevention Systems (IDS/IPS). | IDS/IPS Activity Reports |
Threat Activity | Use the Threat Activity screen to search for and generate a report on threats detected, eliminated, quarantined, and detected but unable to be mitigated. | Threat Activity Reports |
Configuration Activity | Use the Configuration Activity screen to search for and generate a report on the following data; signature file installed, software update, configuration loaded. | Configuration Activity Reports |
Scan Activity | Use the Scan Activity screen to search for and generate a report on the following data; scan delayed, scan aborted. | Scan Activity Reports |
Security Summary | Use the Security Summary screen to search for and generate a report on summarized user and computer activity alongside other product’s security interactions. | Security Summary Reports |
DB IPS Activity | Use the DB IPS Activity screen to search for and generate a report on data (such as username, client/server IP addresses, so on) for various database intrusion prevention events. | DB IPS Activity Reports |
HIPS Activity | Use the
HIPS Activity screen to search for and generate a report on alerts from IPS/IDS signatures, DDOS attacks and port scan occurrences.
See for more details. |
HIPS Activity Reports |
Preparing a Real-time Report includes the common options that you specify for Real-Time Reports.
For information on saving the generated report, see Formats for Saving a Generated Report.
- IDS/IPS Activity Reports
To search for and generate a report on all attack activities from IDS/IPS systems, use the IDS/IPS Activity Real-Time Report. - Threat Activity Reports
To search for and generate a report on all threats detected, eliminated, quarantined, and detected but unable to be mitigated, use the Threat Activity Real-Time Report. - Configuration Activity Reports
To search for and generate a report on all data such as; signature file installed, software update, and configuration loaded, use the Configuration Activity Real-Time Report. - Scan Activity Reports
To search for and generate a report on all scan delayed or scan aborted data, use the Scan Activity Real-Time Report. - Security Summary Reports
To search for and generate a report on all summarized user and computer activity alongside other product’s security interactions, use the Security Summary Real-Time Report. - DB IPS Activity Reports
To search for and generate a report on all data (such as username, client/server IP addresses, so on) for various database intrusion prevention events, use the DB IPS Activity Real-Time Report. - HIPS Activity Reports
To search for and generate a report on all alerts from IPS/IDS signatures, DDOS attacks and port scan occurrences, use the HIPS Activity Real-Time Report.
Copyright © Cloud Software Group, Inc. All rights reserved.