Support Get Quote

SonicWall Firewall

SonicWall firewall security reports

To combat the increasing threat from application-driven attacks, security administrators need to closely scrutinize all gateways. Since firewalls protect against both network and application attacks, monitoring them can give insights into attack patterns.

Security administrators are expected to answer a few common but significant questions about their network:

  • Which connections were denied entry?
  • Which connections were denied entry based on protocol?
  • What are the most critical security threats?
  • What are the top network attacks based on severity?

EventLog Analyzer provides answers to all the above questions and helps detect various security attacks, like denial-of-service, SYN flood, routing table, back door attacks, and many other threats that can collapse the organization’s security system.

The SonicWall security reports are comprehensive and available in various formats and graphical representations. These reports help you gain insights on critical network activities, thereby preventing or mitigating security breaches.

There are two major sets of security reports: denied connections and attacks reports.

Firewall denied connections reports:

Investigating denied firewall connections is important because it reveals the malicious traffic trying to enter the network. With proper monitoring, repeated tries by the same IP address and other anomalies can be highlighted and addressed. These reports give an overview of all denied connections based on source, device, protocol, and port. Use denied connection trend reports to detect abnormalities instantly.

Available Reports

Denied Connections | Top Denied Connection based on Source | Top Denied Connection based on Destination | Top Denied Connection based on Protocol | Top Denied Connection based on Port | Denied Connection Trends

Firewall IDS/IPS reports:

Attack methodologies have evolved over time and become more sophisticated. Examining the attempts to exploit vulnerabilities helps administrators identify loopholes in their network. This lets them know where and how to secure their network better. Firewall attack reports track possible and critical attacks based on source, destination, and severity, along with attack trends.

Available Reports

Possible Attacks | Critical Attacks | Top Attack based on Source | Top Attack based on Destination | Top Attack based on Severity | Attacks Trend

Comprehensive reports on activities in your SonicWall firewalls.

  Download a free trial now!  Request demo

EventLog Analyzer Trusted By

Los Alamos National Bank Michigan State University
Panasonic Comcast
Oklahoma State University IBM
Accenture Bank of America
Ernst Young

Customer Speaks

  • Credit Union of Denver has been using EventLog Analyzer for more than four years for our internal user activity monitoring. EventLog Analyzer provides great value as a network forensic tool and for regulatory due diligence. This product can rapidly be scaled to meet our dynamic business needs.
    Benjamin Shumaker
    Vice President of IT / ISO
    Credit Union of Denver
  • The best thing, I like about the application, is the well structured GUI and the automated reports. This is a great help for network engineers to monitor all the devices in a single dashboard. The canned reports are a clever piece of work.
    Joseph Graziano, MCSE CCA VCP
    Senior Network Engineer
  • EventLog Analyzer has been a good event log reporting and alerting solution for our information technology needs. It minimizes the amount of time we spent on filtering through event logs and provides almost near real-time notification of administratively defined alerts.
    Joseph E. Veretto
    Operations Review Specialist
    Office of Information System
    Florida Department of Transportation
  • Windows Event logs and device Syslogs are a real time synopsis of what is happening on a computer or network. EventLog Analyzer is an economical, functional and easy-to-utilize tool that allows me to know what is going on in the network by pushing alerts and reports, both in real time and scheduled. It is a premium software Intrusion Detection System application.
    Jim Lloyd
    Information Systems Manager
    First Mountain Bank

Awards and Recognitions

A Single Pane of Glass for Comprehensive Log Management