HP Sygate Security Agent User Guide
Table 6. Security Log Parameters and Description
Name of | Description |
Parameter |
|
MAC |
|
|
|
Application | Name of the application associated with the attack |
Name |
|
|
|
User Name | User or Computer client that sent or received the traffic |
|
|
Domain | Domain of the user |
|
|
Security | Security level for the Agent, set to either Block All or Normal. |
|
|
Occurrences | Number of occurrences of the attack method |
|
|
Begin Time | Time the attack began |
|
|
End Time | Time the attack ended |
|
|
Description and Data Fields for the Security Log
Below the rows of logged events are the Description and Data fields. When you click an event row, the entire row is highlighted. A description of the event, such as “Somebody is scanning your device, with 13 attempts,” appears in the Description field.
Figure 3. Security Log
Traffic LogWhenever your device makes a connection through the network, this transaction is recorded in the Traffic Log.
30