Violation Logs Parent topic

Deep Edge violation logs are categorized by eleven types of violation logs identified by “Violation Type”. The following table explains the details of each item in a violation log.
Log Item Description Example
Policy name The security policy name for traffic control known-user
Log time Date and time when recorded 2013-01-23 16:09:46+08:00
Hostname The Deep Edge hostname Deep-edge-inline
Source user The domain user account if Deep Edge is configured as LDAP authentication. Otherwise, it will be left empty Beyondsoft Volume RD01 (EXT-CN)
Source address Client IP address 10.64.37.153
Source port Port number 49494
Destination address Server IP address 115.236.59.77
Destination port  Port number 80
Protocol TCP/UDP/ICMP/ICMPv6 TCP
Direction Outbound/Inbound Outbound
Application The application name identified by Deep Edge, such as HTTP/FTP HTTP
Violation type
 Firewall/IPS/WRS/Anti-Malware /
Anti-Spam/URL Blacklist/Botnet/File extension blacklist/Anti-Dos/HTTP Cert Error/ Client Cert Error
WRS
Action Block/Monitor Block
URL URL visited by clients, if applicable u034024.778669.com/
File name The file name downloaded by clients if applicable --
Malware name The virus name blocked by an Anti-Malware scan --
IPS rule The IPS rule name if it is triggered by IPS scan. --
ERS value 1 = blocked by ERS; 0 = otherwise 0
WRS score The score of URL queried by WRS, if applicable. The scope is 0 ~ 100. A higher value has a better reputation. 49
URL category The URL category of an HTTP request. Default is empty. Disease Vector
Mail sender The message traffic mail sender. Default is empty. --
Mail recipient The message traffic mail recipient. Default is empty. --
Mail subject The message traffic mail subject. Default is empty. --
Description The reason that the message was blocked. Default is empty. --