Audit Logs - Firewall Analyzer Reports


    Audit logs provide a chronological record of system activities, including user actions, access attempts, and configuration changes, crucial for security monitoring and compliance audits. They are based on firewall logs and greatly aid in monitoring and analyzing the Firewall management activities.

    The report has two tabs:

    1. Events
    2. Reports

    Events

    All management events performed in firewall are listed. The following data is displayed in the reports.

    Column Description
    Time The time at which the event was triggered
    Host The source host name or IP address from which requests originated
    User Authenticated user name
    Action Action happened. Values are Login, Logout, Failed Login & Command Executed
    Description Details of the event

     

    Reports

    The management events are also displayed as reports.

    The reports are:

    1. Successful Login
    2. Sucessful Logout
    3. Denied Login
    4. Commands Executed


     
     

    Thank you for your feedback!

    Was this content helpful?

    We are sorry. Help us improve this page.

    How can we improve this page?
    Do you need assistance with this topic?
    By clicking "Submit", you agree to processing of personal data according to the Privacy Policy.