Security Summary Reports
To search for and generate a report on all summarized user and computer activity alongside other product’s security interactions, use the Security Summary Real-Time Report.
Menu path:
For this report, you can select to view various options in the generated report for your appliance. Optional filter operators can be sorted in Ascending or Descending order. Choose sort order using the drop-down menu. The default is to display only Source Device, Source IP, Destination IP, User, and Count.
For information on saving the generated report, see Formats for Saving a Generated Report.
Option | Description |
---|---|
Source Device | Source device that sent these log messages |
Source IP | IP address from which the attack originated |
Destination IP | IP address that was targeted |
Source Port | Port from which the attack originated |
Destination Port | Port that was targeted |
User | User who is making the inquiry |
Source Host | Host from which the attack originated |
Destination Host | Host that was targeted |
Type | Type of connection |
Event | Type of event |
Action | An action associated with the entry type |
Status | Status of the connection |
Count | Number of attacks. |
Copyright © Cloud Software Group, Inc. All rights reserved.