Symantec 10521146 Administration Guide - Page 235

Reports per Network Security device, Table 9-4, Description

Page 235 highlights

Reporting 235 About top-level report types Table 9-4 Types of event reports Type Description Event list by destination IP This report lists all events by destination IP address for all devices and interfaces in the network topology. You can generate drill-down event lists by destination IP from Top Event Destinations. Event list by source IP This report lists all events by source IP address for all devices and interfaces in the network topology. You can generate drill-down event lists by source IP from Top Event Sources. Reports per Network Security device Symantec Network Security generates the following types of device reports: Table 9-5 Types of device reports Type Network Security login history Network Security operational events Devices with flow statistics Description This report lists the user login times, IP addresses from which the user logged in, and the type of user that logged in, either a SuperUser with full read/write privileges, or one of the other user login accounts with limited permissions. Specify the report start and end dates/times. This report is generated in table format only. This report has no drill-down reports. This report lists operational events such as user logins, communication errors, response actions, and license status notifications. This report allows you to drill-down to event details. This report lists names for devices on which the Flow Status Collection sensor mode is enabled, and the number of the software or appliance node where the sensor is located. Symantec Network Security generates this report in table format only. With a SuperUser, Administrator, or StandardUser account, you can generate several drill-down reports for details on sources and destination IP addresses and ports for the flows, as well as flow protocols. Note: SuperUsers, Administrators, and StandardUsers can generate reports from devices with flow statistics; RestrictedUsers cannot. See "User groups reference" on page 319 for more about permissions.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392

235
Reporting
About top-level report types
Reports per Network Security device
Symantec Network Security generates the following types of device reports:
Note:
SuperUsers, Administrators, and StandardUsers can generate reports
from devices with flow statistics; RestrictedUsers cannot. See
²User groups
reference³
on page 319 for more about permissions.
Event list by
destination IP
This report lists all events by destination IP address for all
devices and interfaces in the network topology. You can generate
drill-down event lists by destination IP from Top Event
Destinations.
Event list by source
IP
This report lists all events by source IP address for all devices and
interfaces in the network topology. You can generate drill-down
event lists by source IP from Top Event Sources.
Table 9-4
Types of event reports
Type
Description
Table 9-5
Types of device reports
Type
Description
Network Security
login history
This report lists the user login times, IP addresses from which the
user logged in, and the type of user that logged in, either a
SuperUser with full read/write privileges, or one of the other user
login accounts with limited permissions.
Specify the report start and end dates/times. This report is
generated in table format only. This report has no drill-down
reports.
Network Security
operational events
This report lists operational events such as user logins,
communication errors, response actions, and license status
notifications. This report allows you to drill-down to event
details.
Devices with flow
statistics
This report lists names for devices on which the Flow Status
Collection sensor mode is enabled, and the number of the
software or appliance node where the sensor is located.
Symantec Network Security generates this report in table format
only. With a SuperUser, Administrator, or StandardUser account,
you can generate several drill-down reports for details on sources
and destination IP addresses and ports for the flows, as well as
flow protocols.