Procedure
- Go to one of the following:
-
- In the agent tree, click the root domain icon () to include all agents or select specific domains or agents.
- Go to the Firewall Log Criteria screen:
-
From the Security Risk Logs screen, click.
-
From the Agent Management screen, click.
-
- To ensure that the most up-to-date logs are available, click Notify Agents. Allow some time for agents to send firewall logs before proceeding to the next step.
- Specify the log criteria and then click Display Logs.
- View logs. Logs contain the following information:ItemDescriptionDate/TimeThe time the detection occurredEndpointThe endpoint on which the detection occurredDomainThe domain on which the detection occurredRemote HostThe IP address of the remote hostLocal HostThe IP address of the local hostProtocolThe protocol usedPortThe port numberDirection
-
Receive: Indicates that the traffic was inbound
-
Send: Indicates that the traffic was outbound
ProcessThe executable program or service running on the endpoint that triggered the firewall violationDescriptionSpecifies the actual security risk (such as a network virus or IDS attack) or the firewall policy violation -
- To save logs to a comma-separated value (CSV) file, click Export All to CSV. Open the file or save it to a specific location.