Security Tab - Firewall Analyzer Central Server


Security Reports section includes reports that help in monitoring and analyzing the security and effectiveness of the firewall, and assist in identifying, tracking, and investigating potential security risks. 

Security Events Summary pie-graph shows the top events generated with severity as Emergency, Critical, Alert, Error, or Warning.

Drill down from this graph to see the following details:

FieldDescription
HostThe host name or IP address of the host generating denied events
SeverityThe event severity of the event generated
HitsThe number of times the event was generated
TimeThe timestamp of the last time when the event was generated
MessageThe event message generated

Top N Blocked URLs by Hits report shows the top URLs that were blocked for the selected time period.

In this report you will see the following details:

FieldDescription
HostThe host name or IP address of the host whose requests were pointing to blocked URLs
DestinationThe destination host name or IP address that denied the request
URLThe URL of the web site which was blocked
HitsThe number of times the request was generated

Top N Spam Senders by Hits report shows the source of generation for each spam with sender Email address and the number of times the spam was sent.

In this report you will see the following details:

FieldDescription
HostThe host or IP address that generates the Spam
SenderSender Email address
HitsNumber of spam mail sent

The Top N Attacks by Hits report shows the status of the Top Attacks (ID or names) based on the number of hits. Drill down from this graph to see the following details:

FieldDescription
AttackThe name or id (as defined by the firewall) of the attack that was sent or received
HostThe host or IP address that sent the attack file
DestinationThe destination host or IP address to which the attack file was sent
ProtocolThe protocol used by the attack to send this attack file
SeverityThe severity level of the attack, as defined by the firewall
HitsThe number of times the attack file was sent to the same host
SubtypeThe subtype of the attack, as defined by the firewall
TimeThe time stamp when the attack file was sent
StatusThe status of the attack that was sent or received
MessageThe attack message generated by the firewall

Top N Viruses by Hits report shows the status of the Top Virus. Drill down from these graphs to see the following details:

FieldDescription
VirusThe name of the virus that sent this file
HostThe host or IP address that sent the virus file
DestinationThe destination host or IP address to which the virus file was sent
ProtocolThe protocol used by the virus to send this virus file
SeverityThe severity level of the virus, as defined by the firewall
HitsThe number of times the virus file was sent to the same host
SubtypeThe subtype of the virus, as defined by the firewall
TimeThe timestamp when the virus file was sent
MessageThe virus message generated by the firewall

 

 

Featured links

 

 

Thank you for your feedback!

Was this content helpful?

We are sorry. Help us improve this page.

How can we improve this page?
Do you need assistance with this topic?
By clicking "Submit", you agree to processing of personal data according to the Privacy Policy.
A single platter for comprehensive Network Security Device Management