Violation details are based on the violation
type:
- Timestamp
- Source IP address
- Destination IP address
- Source user
- Application ID
- Policy
- Action
- Mail sender
- Mail recipient
- Ability to view, print, or export to CSV the generated log
|
- Violation type:
- Firewall
- IPS
- Anti-malware
- WRS
- Anti-spam
- URL Blacklist
- Botnet
- File Extension Blacklist
- Anti-DoS
- HTTPS Cert Error
- Client Cert Block
|