The Security Agent generates logs after detecting firewall violations and then sends the logs to the server.
Logs > Agents > Security Risks
Agents > Agent Management
From the Security Risk Logs screen, click View Logs > Firewall Logs.
From the Agent Management screen, click Logs > Firewall Logs.
Item |
Description |
---|---|
Date/Time |
The time the detection occurred |
Endpoint |
The endpoint on which the detection occurred |
Domain |
The domain on which the detection occurred |
Remote Host |
The IP address of the remote host |
Local Host |
The IP address of the local host |
Protocol |
The protocol used |
Port |
The port number |
Direction |
|
Process |
The executable program or service running on the endpoint that triggered the firewall violation |
Description |
Specifies the actual security risk (such as a network virus or IDS attack) or the firewall policy violation |