Purpose View general troubleshooting information when using Suspicious Endpoints.
Location: Gateways > (gateway name) > NETWORK ACCESS CONTROL > Suspicious Endpoints > Troubleshooting

Procedure

  1. Do the following to troubleshoot Suspicious Endpoints:
    • View individual log entries to determine which endpoints have been blocked for suspicious activity.
    • Click Refresh to update the logs.