Home » Firewall Reports » Security Reports

Security Reports


 

The Security Reports section includes reports that help in monitoring and analyzing the security and effectiveness of the firewall, and assist in identifying, tracking, and investigating potential security risks.

 

On the top right side of the Report screen, there will be three combo boxes. They are:

  • Top 5
  • Filter by
  • Export as

Top 5

 

The Top 5 combo box lets you choose the level of detail in the reports. By default, the top five values are shown. To show more than 15 values, the report uses only tables. There is an option to display the Graph only.

  • Top 5 (graph & table)
  • Top 10 (graph & table)
  • Top 15 (table only)
  • Top 20 (table only)
  • Top 25 (table only)
  • Graph only

Below each graph click the Hide Table link to hide the table. Click the Show Table link to see the table again.

 

Filter by

 

The Filter by combo box lets you choose the field of filter in the reports. There will be three field values for filtering. They are:

  • Source
  • Destination
  • Protocol
  • Summary

Export as

 

The Export as combo box lets you choose the format of the reports for export. There will be two formats for exporting. They are:

  • PDF
  • CSV

Click on the PDF to export this report to PDF. Click on the CSV to export this report to CSV format (comma separated values).

 

 

The Top Denied Hosts report shows the top source IP addresses or host names that have been denied requests for the selected time period. The Top Denied Destinations report shows the top destination IP addresses or host names that have been denied responses for the selected time period.

 

Drill down from these graphs to see the following details:

 

Field Description
Destination/ Host The destination host name or IP address to which requests were denied/
The host name or IP address of the host whose requests were denied
Protocol The protocol used by the denied request
Hits The number of times the request was generated
Time The timestamp of the last time when the request was received
Message The message generated when the request was denied

 

The Top Denied Protocols report shows the top protocols that have been denied requests for the selected time period.

Drill down from this graph to see the following details:

 

Field Description
Host The host name or IP address of the host whose requests were denied
Destination The destination host name or IP address that denied the request
Hits The number of times the request was generated
Time The timestamp of the last time when the request was received
Message The message generated when the request was denied

 

The Top Security Events pie-graph shows the top events generated with severity as Emergency, Critical, Alert, Error, or Warning.

Drill down from this graph to see the following details:

 

Field Description
Host The host name or IP address of the host generating denied events
Severity The event severity of the event generated
Hits The number of times the event was generated
Time The timestamp of the last time when the event was generated
Message The event message generated

 

The Top Blocked URLs report shows the top URLs that were blocked for the selected time period.

In this report you will see the following details:

 

Field Description
Host The host name or IP address of the host whose requests were pointing to blocked URLs
Destination The destination host name or IP address that denied the request
URL The URL of the web site which was blocked
Hits The number of times the request was generated
Copyright © 2013, ZOHO Corp. All Rights Reserved.
ManageEngine