Security Reports section includes reports that help in monitoring and analyzing the security and effectiveness of the firewall, and assist in identifying, tracking, and investigating potential security risks.
Security Events Summary pie-graph shows the top events generated with severity as Emergency, Critical, Alert, Error, or Warning.
Drill down from this graph to see the following details:
Field | Description |
---|---|
Host | The host name or IP address of the host generating denied events |
Severity | The event severity of the event generated |
Hits | The number of times the event was generated |
Time | The timestamp of the last time when the event was generated |
Message | The event message generated |
Top N Blocked URLs by Hits report shows the top URLs that were blocked for the selected time period.
In this report you will see the following details:
Field | Description |
---|---|
Host | The host name or IP address of the host whose requests were pointing to blocked URLs |
Destination | The destination host name or IP address that denied the request |
URL | The URL of the web site which was blocked |
Hits | The number of times the request was generated |
Top N Spam Senders by Hits report shows the source of generation for each spam with sender Email address and the number of times the spam was sent.
In this report you will see the following details:
Field | Description |
---|---|
Host | The host or IP address that generates the Spam |
Sender | Sender Email address |
Hits | Number of spam mail sent |
The Top N Attacks by Hits report shows the status of the Top Attacks (ID or names) based on the number of hits. Drill down from this graph to see the following details:
Field | Description |
---|---|
Attack | The name or id (as defined by the firewall) of the attack that was sent or received |
Host | The host or IP address that sent the attack file |
Destination | The destination host or IP address to which the attack file was sent |
Protocol | The protocol used by the attack to send this attack file |
Severity | The severity level of the attack, as defined by the firewall |
Hits | The number of times the attack file was sent to the same host |
Subtype | The subtype of the attack, as defined by the firewall |
Time | The time stamp when the attack file was sent |
Status | The status of the attack that was sent or received |
Message | The attack message generated by the firewall |
Top N Viruses by Hits report shows the status of the Top Virus. Drill down from these graphs to see the following details:
Field | Description |
---|---|
Virus | The name of the virus that sent this file |
Host | The host or IP address that sent the virus file |
Destination | The destination host or IP address to which the virus file was sent |
Protocol | The protocol used by the virus to send this virus file |
Severity | The severity level of the virus, as defined by the firewall |
Hits | The number of times the virus file was sent to the same host |
Subtype | The subtype of the virus, as defined by the firewall |
Time | The timestamp when the virus file was sent |
Message | The virus message generated by the firewall |
Featured links