Monitoring and Logging
Table 5. Security Log Icons
Icon Description
Critical attack
Major attack
Minor attack
Information
Security Log Parameters and Description
The columns for logged events are:
Table 6. Security Log Parameters and Description
Name of | Description |
Parameter |
|
Time | The exact date and time that the event was logged |
|
|
Security Type | Type of Security Alert (for example: DoS attack, executable file, Ping of |
| Death) |
|
|
Severity | The severity of the attack (either Critical, Major, Minor, or Information) |
|
|
Direction | Direction that the traffic was traveling in (incoming, outgoing, or |
| |
| computer. Other attacks, like Trojan horses, are programs that have been |
| downloaded to your device and therefore are already present; they are |
| considered outgoing. Still other attacks are unknown in direction; they |
| include Active Response or application executable changed. |
|
|
Protocol | Type of |
|
|
Remote Host | Name of the remote computer (only appears in Local View - this is the default) |
|
|
Remote MAC | MAC address of the remote device. If outside the subnet, it is the MAC |
| address of the router. (only appears in Local View - this is the default) |
|
|
Local Host | IP address of the local computer (only appears in Local View - this is the |
| default) |
|
|
Local MAC | MAC address of the local computer (only appears in Local View - this is the |
| default) |
|
|
Source Host | Name of the source computer (only appears in Source View) |
|
|
Source MAC | MAC address of the source computer (only appears in Source View) |
|
|
Destination | IP address of the destination computer (only appears in Source View) |
Host |
|
|
|
Destination | MAC address of the destination computer (only appears in Source View) |
|
|
29