Security Tab - Firewall Analyzer Central Server


    Security Reports section includes reports that help in monitoring and analyzing the security and effectiveness of the firewall, and assist in identifying, tracking, and investigating potential security risks. 

    Security Events Summary pie-graph shows the top events generated with severity as Emergency, Critical, Alert, Error, or Warning.

    Drill down from this graph to see the following details:

    Field Description
    Host The host name or IP address of the host generating denied events
    Severity The event severity of the event generated
    Hits The number of times the event was generated
    Time The timestamp of the last time when the event was generated
    Message The event message generated

    Top N Blocked URLs by Hits report shows the top URLs that were blocked for the selected time period.

    In this report you will see the following details:

    Field Description
    Host The host name or IP address of the host whose requests were pointing to blocked URLs
    Destination The destination host name or IP address that denied the request
    URL The URL of the web site which was blocked
    Hits The number of times the request was generated

    Top N Spam Senders by Hits report shows the source of generation for each spam with sender Email address and the number of times the spam was sent.

    In this report you will see the following details:

    Field Description
    Host The host or IP address that generates the Spam
    Sender Sender Email address
    Hits Number of spam mail sent

    The Top N Attacks by Hits report shows the status of the Top Attacks (ID or names) based on the number of hits. Drill down from this graph to see the following details:

    Field Description
    Attack The name or id (as defined by the firewall) of the attack that was sent or received
    Host The host or IP address that sent the attack file
    Destination The destination host or IP address to which the attack file was sent
    Protocol The protocol used by the attack to send this attack file
    Severity The severity level of the attack, as defined by the firewall
    Hits The number of times the attack file was sent to the same host
    Subtype The subtype of the attack, as defined by the firewall
    Time The time stamp when the attack file was sent
    Status The status of the attack that was sent or received
    Message The attack message generated by the firewall

    Top N Viruses by Hits report shows the status of the Top Virus. Drill down from these graphs to see the following details:

    Field Description
    Virus The name of the virus that sent this file
    Host The host or IP address that sent the virus file
    Destination The destination host or IP address to which the virus file was sent
    Protocol The protocol used by the virus to send this virus file
    Severity The severity level of the virus, as defined by the firewall
    Hits The number of times the virus file was sent to the same host
    Subtype The subtype of the virus, as defined by the firewall
    Time The timestamp when the virus file was sent
    Message The virus message generated by the firewall