HP Sygate Security Agent User Guide

Table 6. Security Log Parameters and Description

Name of

Description

Parameter

 

MAC

 

 

 

Application

Name of the application associated with the attack

Name

 

 

 

User Name

User or Computer client that sent or received the traffic

 

 

Domain

Domain of the user

 

 

Security

Security level for the Agent, set to either Block All or Normal.

 

 

Occurrences

Number of occurrences of the attack method

 

 

Begin Time

Time the attack began

 

 

End Time

Time the attack ended

 

 

Description and Data Fields for the Security Log

Below the rows of logged events are the Description and Data fields. When you click an event row, the entire row is highlighted. A description of the event, such as “Somebody is scanning your device, with 13 attempts,” appears in the Description field.

Figure 3. Security Log

Traffic Log

Whenever your device makes a connection through the network, this transaction is recorded in the Traffic Log.

30