Configuration Activity Reports

To search for and generate a report on all data such as; signature file installed, software update, and configuration loaded, use the Configuration Activity Real-Time Report.

Menu path: Reports > Threat Management > Configuration Activity

For this report, you can select to view various options in the generated report for your Appliance. Optional filter operators can be sorted in Ascending or Descending order. Choose sort order using the list. The default is to display only Source Device, Event Name, Category , User Name, Target User Name, Action, Status, and Count:

For information on saving the generated report, see Formats for Saving a Generated Report.

Configuration Activity Report - Optional Filter Operators
Option Description
Source Device Source device that sent these log messages
Event Name Name of the event
Event Type Type of event
Category The category of the event
Severity ID The severity ID
Severity Name The name of the severity code associated with the event
User Name Name of the user who is making the inquiry
Target User Name User for whom the inquiry is being made
Threat Type The type of threat associated with the event
Source IP IP address from which the attack originated
Destination IP IP address that was targeted
Analyzer Name Name of the analyzer
Analyzer Version The version of the analyzer
Data Version The version of the data associated with the event
Action An action associated with the entry type
Status Status of the connection
Count Number of attacks.