ECM Policy Reports
To search for and generate a report on data leak protection events captured by the log source device use the ECM Policy Real-Time Report.
Menu path:
In addition to setting the common report options in Preparing a Real-time Report, you can select optional filter operators in the generated report.
You can select to view various options in ascending or descending order. Choose the sort order by using the list. The default is to display the Source Device, Source Device IP, Performer Name, Parent Name, Event, Event Name, and Count.
For information on saving the generated report, see Formats for Saving a Generated Report.
Option | Description |
---|---|
Source Device | Device that sent these log messages |
Source Device IP | IP address of the device that exercised the policy |
Performer Name | Name of the performer |
Parent Name | Name of the parent |
Object Name | Name of the object that was acted on |
Event | The type of event |
Event Name | Name of the event |
Source Name | Name of the source host device |
Count | Number of attacks |
Copyright © 2020. Cloud Software Group, Inc. All Rights Reserved.