Log Source Report Mapping for Threat Management

Log Source Report Mapping by Device Type – Threat Management
Device Type Log Source Reports
All IDS/IPS Activity
All HIPS Activity
Cisco ASA IDS/IPS Activity
Cisco ASA Security Summary
Cisco ESA Threat Activity
Cisco ESA Configuration Activity
Cisco ESA Scan Activity
Cisco ESA Security Summary
Cisco FWSM IDS/IPS Activity
Cisco IOS IDS/IPS Activity
Cisco IPS Security Summary
Cisco ISE Security Summary
Cisco NXOS Security Summary
Cisco NXOS2 Security Summary
Cisco IPS IDS/IPS Activity
Cisco PIX IDS/IPS Activity
Cisco Secure ACS Security Summary
Cisco WSA Security Summary
F5 TMOS Security Summary
Fortinet FortiOS IDS/IPS Activity
Fortinet FortiOS Threat Activity
Guardium SQL Guard DB IPS Activity
Guardium SQLGuard Audit DB IPS Activity
ISS RealSecure NIDS IDS/IPS Activity
ISS SiteProtector IDS/IPS Activity
Juniper IDP IDS/IPS Activity
Juniper JunOS IDS/IPS Activity
Juniper JunOS Security Summary
McAfee ePolicy Orchestrator Configuration Activity
McAfee ePolicy Orchestrator HIPS Activity
McAfee ePolicy Orchestrator Scan Activity
McAfee ePolicy Orchestrator Threat Activity
Palo Alto Networks PANOS IDS/IPS Activity
Palo Alto Networks PANO Threat Activity
SiteProtector IDS/IPS Activity
Snort IDS/IPS Activity
Sourcefire IDS/IPS Activity
Sourcefire Defense Center IDS/IPS Activity
Symantec AntiVirus Configuration Activity
Symantec AntiVirus Scan Activity
Symantec AntiVirus Threat Activity
Symantec Endpoint Protection Threat Activity
Symantec Endpoint Protect Configuration Activity
Symantec Endpoint Protection HIPS Activity
Symantec Endpoint Protection Scan Activity
Symantec Endpoint Protection Security Summary
TrendMicro Control Manager Threat Activity
TrendMicro OfficeScan Threat Activity