Configuration Activity Reports
To search for and generate a report on all data such as; signature file installed, software update, and configuration loaded, use the Configuration Activity Real-Time Report.
Menu path:
For this report, you can select to view various options in the generated report for your Appliance. Optional filter operators can be sorted in Ascending or Descending order. Choose sort order using the drop-down menu. The default is to display only Source Device, Event Name, Category , User Name, Target User Name, Action, Status, and Count:
For information on saving the generated report, see Formats for Saving a Generated Report.
Option | Description |
---|---|
Source Device | Source device that sent these log messages |
Event Name | Name of the event |
Event Type | Type of event |
Category | The category of the event |
Severity ID | The severity ID |
Severity Name | The name of the severity code associated with the event |
User Name | Name of the user who is making the inquiry |
Target User Name | User for whom the inquiry is being made |
Threat Type | The type of threat associated with the event |
Source IP | IP address from which the attack originated |
Destination IP | IP address that was targeted |
Analyzer Name | Name of the analyzer |
Analyzer Version | The version of the analyzer |
Data Version | The version of the data associated with the event |
Action | An action associated with the entry type |
Status | Status of the connection |
Count | Number of attacks. |
Copyright © Cloud Software Group, Inc. All rights reserved.