HP T5700 HP Sygate Security Agent User Guide - Page 40

Traffic Log, Name of, Parameter, Description, Block All, Normal - thin client computers

Page 40 highlights

HP Sygate Security Agent User Guide Table 6. Security Log Parameters and Description Name of Parameter MAC Description Application Name Name of the application associated with the attack User Name User or Computer client that sent or received the traffic Domain Domain of the user Security Security level for the Agent, set to either Block All or Normal. Occurrences Number of occurrences of the attack method Begin Time Time the attack began End Time Time the attack ended Description and Data Fields for the Security Log Below the rows of logged events are the Description and Data fields. When you click an event row, the entire row is highlighted. A description of the event, such as "Somebody is scanning your device, with 13 attempts," appears in the Description field. Figure 3. Security Log Traffic Log Whenever your device makes a connection through the network, this transaction is recorded in the Traffic Log. 30

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76

HP Sygate Security Agent User Guide
Table 6.
Security Log Parameters and Description
Name of
Parameter
Description
MAC
Application
Name
Name of the application associated with the attack
User Name
User or Computer client that sent or received the traffic
Domain
Domain of the user
Security
Security level for the Agent, set to either
Block All
or
Normal
.
Occurrences
Number of occurrences of the attack method
Begin Time
Time the attack began
End Time
Time the attack ended
Description and Data Fields for the Security Log
Below the rows of logged events are the
Description
and
Data
fields. When you click an
event row, the entire row is highlighted. A description of the event, such as “Somebody is
scanning your device, with 13 attempts,” appears in the
Description
field.
Figure 3.
Security Log
Traffic Log
Whenever your device makes a connection through the network, this transaction is recorded
in the Traffic Log.
30