Security Settings Reports
To search for and generate a report containing logs of all the events related to creation, deletion, modification of user/group/roles use the Security Settings Real-Time Report.
Menu path:
In addition to setting the common report options in Preparing a Real-time Report, you can select optional filter operators in the generated report.
You can select to view various options in ascending or descending order. Choose the sort order by using the list. The default is to display the Source Device, Source Device IP, Performer Name, Parent Name, Event, and Count.
For information on saving the generated report, see Formats for Saving a Generated Report.
Option | Description |
---|---|
Source Device | Device that sent these log messages |
Source Device IP | IP address of the device that exercised the policy |
Performer Name | Name of the performer |
Parent Name | Name of the parent |
Object Name | Name of the object that was acted on |
Event | The type of event |
Event Name | Name of the event |
Source Name | Name of the source host device |
Count | Number of attacks |
For information on saving the generated report, see Formats for Saving a Generated Report.