Audit Logs - Firewall Analyzer Reports


Audit logs provide a chronological record of system activities, including user actions, access attempts, and configuration changes, crucial for security monitoring and compliance audits. They are based on firewall logs and greatly aid in monitoring and analyzing the Firewall management activities.

The report has two tabs:

  1. Events
  2. Reports

Events

All management events performed in firewall are listed. The following data is displayed in the reports.

ColumnDescription
TimeThe time at which the event was triggered
HostThe source host name or IP address from which requests originated
UserAuthenticated user name
ActionAction happened. Values are Login, Logout, Failed Login & Command Executed
DescriptionDetails of the event

 

Reports

The management events are also displayed as reports.

The reports are:

  1. Successful Login
  2. Sucessful Logout
  3. Denied Login
  4. Commands Executed


 
 

A single platter for comprehensive Network Security Device Management