Customize the Events log to display as many or few columns that meet your needs.
To select which columns to display:
Click Grid icon . The Grid Settings dialog displays:
Select the items you want to appear as columns in the Threat Log.
Category Name | Column |
---|---|
Timestamp | Time |
Application | Application |
Component | |
URL | URL |
URL Rating | |
URL Severity | |
User Name | User Name |
Threat | Virus |
Intrusion | |
Spyware | |
Botnet | |
Time | Start Time |
Last Updated | |
IP Address | Initiator IP |
Responder IP | |
IP | Protocol Name |
Port | Initiator Port |
Responder Port | |
Country | Initiator |
Responder | |
FileName | FileName |
Capture ATP | Action |
Interface | Initiator Interface |
Initiator Interface | |
BWM | Inbound Priority |
Outbound Priority | |
Statistics | All Counters |
Initiator Bytes | |
Responder Bytes | |
Status | Flow Status |
Blocked Reason | |
Policies | Security Rule |
NAT Rule | |
Init Route Rule | |
Resp Route Rule | |
Decryption SSL Rule | |
Decryption SSH Rule | |
DoS Rule | |
MAC | Init MAC |
Responder MAC | |
Miscellaneous | Initiator Gateway |
Responder Gateway | |
Initiator VPN Name | |
Gateway VPN Name |