Policy Reports
To search for and generate reports on information about policies that were exercised on a log source, use Policy reports.
The Report Information tab that appears when you click on
lists which reports are available for each log source.Choose
from the navigation menu, where report-name is one of:Report | Reports Provide | More information |
---|---|---|
Check Point Policies | The Check Point Policies report lists current Check Point Firewall policy rules on log sources connected to your Appliance. | Check Point Policies Reports |
Network Policies | Use the Network Policies screen to search for and generate a report on the number of times a particular network policy has been exercised by a selected firewall device. | Network Policies Reports |
Rules/Policies | Use the Rules/Policies screen to search for and generate a report on enforcement of a particular rule or policy by a selected firewall device. | Rules/Policies Reports |
ECM Policy | Use the ECM Policy screen to search for and generate a report on data leak protection events captured by the log source device. | ECM Policy Reports |
Preparing a Real-time Report includes the common options that you specify for all Real-Time Reports.
Optional filter operators are different for each Event Logs report, and explained in their respective sections.
For information on saving the generated report, see Formats for Saving a Generated Report. s
Copyright © Cloud Software Group, Inc. All rights reserved.