HP t5710 HP Sygate Security Agent User Guide - Page 39

Description, Name of, Parameter, Monitoring and Logging

Page 39 highlights

Monitoring and Logging Table 5. Security Log Icons Icon Description Critical attack Major attack Minor attack Information Security Log Parameters and Description The columns for logged events are: Table 6. Security Log Parameters and Description Name of Parameter Time Description The exact date and time that the event was logged Security Type Type of Security Alert (for example: DoS attack, executable file, Ping of Death) Severity The severity of the attack (either Critical, Major, Minor, or Information) Direction Direction that the traffic was traveling in (incoming, outgoing, or unknown)-Most attacks are incoming, that is, they originate in another computer. Other attacks, like Trojan horses, are programs that have been downloaded to your device and therefore are already present; they are considered outgoing. Still other attacks are unknown in direction; they include Active Response or application executable changed. Protocol Type of protocol-UDP, TCP, and ICMP Remote Host Name of the remote computer (only appears in Local View - this is the default) Remote MAC MAC address of the remote device. If outside the subnet, it is the MAC address of the router. (only appears in Local View - this is the default) Local Host IP address of the local computer (only appears in Local View - this is the default) Local MAC MAC address of the local computer (only appears in Local View - this is the default) Source Host Name of the source computer (only appears in Source View) Source MAC MAC address of the source computer (only appears in Source View) Destination Host IP address of the destination computer (only appears in Source View) Destination MAC address of the destination computer (only appears in Source View) 29

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76

Monitoring and Logging
Table 5.
Security Log Icons
Icon
Description
Critical attack
Major attack
Minor attack
Information
Security Log Parameters and Description
The columns for logged events are:
Table 6.
Security Log Parameters and Description
Name of
Parameter
Description
Time
The exact date and time that the event was logged
Security Type
Type of Security Alert (for example: DoS attack, executable file, Ping of
Death)
Severity
The severity of the attack (either Critical, Major, Minor, or Information)
Direction
Direction that the traffic was traveling in (incoming, outgoing, or
unknown)—Most attacks are incoming, that is, they originate in another
computer. Other attacks, like Trojan horses, are programs that have been
downloaded to your device and therefore are already present; they are
considered outgoing. Still other attacks are unknown in direction; they
include Active Response or application executable changed.
Protocol
Type of protocol—UDP, TCP, and ICMP
Remote Host
Name of the remote computer
(only appears in Local View - this is the default)
Remote MAC
MAC address of the remote device. If outside the subnet, it is the MAC
address of the router.
(only appears in Local View - this is the default)
Local Host
IP address of the local computer
(only appears in Local View - this is the
default)
Local MAC
MAC address of the local computer
(only appears in Local View - this is the
default)
Source Host
Name of the source computer
(only appears in Source View)
Source MAC
MAC address of the source computer
(only appears in Source View)
Destination
Host
IP address of the destination computer
(only appears in Source View)
Destination
MAC address of the destination computer
(only appears in Source View)
29