Security Reports
The Security Reports section includes reports that help in
monitoring and analyzing the security and effectiveness of the firewall, and
assist in identifying, tracking, and investigating potential security risks.
On the top right side of the Report screen, there will be three combo boxes. They are:
- Top 5
- Filter by
- Export as
Top 5
The Top 5 combo box lets you choose the level of detail in the reports. By default, the top five values are shown. To show more than 15 values, the
report uses only tables. There is an option to display the Graph only.
- Top 5 (graph & table)
- Top 10 (graph & table)
- Top 15 (table only)
- Top 20 (table only)
- Top 25 (table only)
- Graph only
Below each graph click the Hide Table link to hide the
table. Click the Show Table link to see the table again.
Filter by
The Filter by combo box lets you choose the field of filter in the reports. There will be three field values for filtering. They are:
- Source
- Destination
- Protocol
- Summary
Export as
The Export as combo box lets you choose the format of the reports for export. There will be two formats for exporting. They are:
Click on the PDF to export this report to PDF. Click on the CSV to export this report to CSV format (comma separated values).
The Top Denied Hosts report shows the top source IP addresses
or host names that have been denied requests for the selected time period. The
Top Denied Destinations report shows the top destination IP
addresses or host names that have been denied responses for the selected time
period.
Drill down from these graphs to see the following details:
Field |
Description |
Destination/ Host |
The destination host name or IP address to which requests were denied/
The host name or IP address of the host whose requests were denied |
Protocol |
The protocol used by the denied request |
Hits |
The number of times the request was generated |
Time |
The timestamp of the last time when the request was received |
Message |
The message generated when the request was denied |
The Top Denied Protocols report shows the top protocols that
have been denied requests for the selected time period.
Drill down from this graph to see the following details:
Field |
Description |
Host |
The host name or IP address of the host whose requests were denied
|
Destination |
The destination host name or IP address that denied the request |
Hits |
The number of times the request was generated |
Time |
The timestamp of the last time when the request was received |
Message |
The message generated when the request was denied |
The Top Security Events pie-graph shows the top events
generated with severity as Emergency, Critical, Alert, Error, or Warning.
Drill down from this graph to see the following details:
Field |
Description |
Host |
The host name or IP address of the host generating denied events |
Severity |
The event severity of the event generated |
Hits |
The number of times the event was generated |
Time |
The timestamp of the last time when the event was generated |
Message |
The event message generated |
The Top Blocked URLs report shows the top URLs that
were blocked for the selected time period.
In this report you will see the following details:
Field |
Description |
Host |
The host name or IP address of the host whose requests were pointing to blocked URLs |
Destination |
The destination host name or IP address that denied the request |
URL |
The URL of the web site which was blocked |
Hits |
The number of times the request was generated |
|