HP T5700 HP Sygate Security Agent User Guide - Page 40
Traffic Log, Name of, Parameter, Description, Block All, Normal - thin client computers
View all HP T5700 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 40 highlights
HP Sygate Security Agent User Guide Table 6. Security Log Parameters and Description Name of Parameter MAC Description Application Name Name of the application associated with the attack User Name User or Computer client that sent or received the traffic Domain Domain of the user Security Security level for the Agent, set to either Block All or Normal. Occurrences Number of occurrences of the attack method Begin Time Time the attack began End Time Time the attack ended Description and Data Fields for the Security Log Below the rows of logged events are the Description and Data fields. When you click an event row, the entire row is highlighted. A description of the event, such as "Somebody is scanning your device, with 13 attempts," appears in the Description field. Figure 3. Security Log Traffic Log Whenever your device makes a connection through the network, this transaction is recorded in the Traffic Log. 30