Firewall Analyzer


The Only Multi-vendor Log and Configuration Monitoring Software for Network Security Devices

Virus, Attack, Security, and Spam Reports

from Firewall Logs

Detailed Security, Virus, Attack and Spam Analysis

Firewall Analyzer includes instant reports on viruses, attacks and security breach in your network. These reports instantly show you the viruses active on the network, the hosts that have been affected, and more. With these reports it is easier for IT to do business risk assessment, detect problems and resolve them as soon as they are found.

Security Reports

Firewall Security Report

Security reports give detailed information on possible security threats to the network. Reports include information on top denied hosts, denied protocols, and top security events generated. These reports give more insight into possible security threats, and help IT determine if security policies across the network need to be revised.

Virus Reports

Firewall Virus Report

Virus reports give in-depth information on virus attacks, hosts infected, severity of the attack, subtype, and more. With drillable details to the raw log level on top viruses and top protocols used by viruses, the complete details of the virus related raw log is available. The raw log message make troubleshooting and problem resolution faster and more efficient.

Attack Reports

Firewall Attack Report

Attack reports give detailed information on possible network attacks, peer-to-peer attacks, etc. Reports include information on top attackers, top targets, protocols used for the attack, etc. Top attackers report distinguishes between two scenario like, one user attacking large number of hosts (say 1000) with particular type of attack and one user attacking a single host with large number (say 1000) of particular type of attack. These reports gives the IT administrators with insight to counter such attacks.

Spam Reports

Firewall Spam Report

Spam reports give detailed information on spam activity in the netwrok. Reports include information on top spam generators, top spam receivers, and top rules allowing spam. These reports give more insight into possible spam threats, and help IT department control the spam activity across the network.