Un firewall es un componente importante en la red de su organización. Proporciona a los administradores de red la capacidad de controlar el flujo de tráfico hacia y desde la red. El análisis de los firewall logs lo mantiene actualizado sobre todas las transacciones entre la intranet de su organización e internet o cualquier otra red externa. Estos son algunos posibles usos para analizar los firewall logs:
Informes disponibles
Rule Added | Rule Modified | Rule Deleted | Settings Restored | Settings Changed | Group Policy Changes
Informes disponibles
VPN Logons | Firewall Denied Connections | Failed VPN Logons | Firewall Logons | Firewall Failed Logons
Informes disponibles
Firewall Denied Connections | Top Firewall Denied Connections based on Source | Top Firewall Denied Connections on device | Top Firewall Denied Connections based on Protocol | Top Firewall Denied Connections based on Port | Denied Connections Trend
Informes disponibles
Logons | Failed Logons | Top Successful logons based on user | Top logons based on remote devices | Top logons based on ports | Top failed logons based on users | Top failed logons based on remote devices | Top failed logons based on ports | Logon Trend | Failed logon trend
Informes disponibles
VPN Logons | Failed VPN Logons | VPN Lockouts | VPN Unlocks | Top Logon based on users | Top logons based on remote devices | Top Failed VPN Logons based on User | Top Failed VPN Logons based on Remotedevice | Top VPN Lockouts based on User | VPN logon trend reports | Failed VPN Logons Trend
Informes disponibles
VPN Logons | Failed VPN Logons | VPN Lockouts | VPN Unlocks | Added users | Deleted users | Added Group policies | Deleted group policies | Changed user privilege levels | Executed commands
Informes disponibles
Windows firewall threats.
Spoof Attack | Internet Protocol half-scan attack | Flood Attack | Ping of Death Attack | SYN Attack
Firewall threats
Syn Flood Attack | Routing Table Attack | Attack Reports | Top Attacks | Top Attackers | Top Attacked device | Top Interface | Attacks Trend
Informes disponibles
Allowed Firewall Traffic | Top Firewall Traffic based on Source | Top Firewall Traffic based on Destination | Top Firewall Traffic based on Protocol | Top Firewall Traffic based on Port