
ManageEngine Firewall Analyzer :: User Guide
162
Zoho Corp.
You will find Edit Search Criteria link to edit and modify the search criteria.
On clicking the link, you will find Device Name pix501(non-editable), Search Time
From: <> To: <>. Next there will be two tabs: Search Traffic Logs and Search
Security Logs. Choose one of the tabs as required. Define the search criteria in the
Define Criteria section using the options Match all of the following, Match any of
the following, select criteria and logical operator from the from the list and enter the
value in the text box. Use Add Criteria and Remove Criteria links to add more than
one criterion. The search criteria for Security logs are: Protocol, Source, Destination,
User, Virus, Attack, Severity, URL, Status, Rule, VPN, Duration, Message. The search
criteria for Traffic logs are: Protocol, Source, Destination, User, Sent (in Bytes), Received
(in Bytes), Rule, VPN.
Then, you can view the raw logs Search Result Between [ YYYY-MM-DD HH:MM:SS
to YYYY-MM-DD HH:MM:SS ]. You can click View All Security Logs link to view all
the security logs.
Below that, you will find Formatted Logs, Raw Logs tabs. You can choose the tabs to
view either formatted logs or raw logs. Click
Configure Columns to select the
columns to be displayed for the formatted logs The columns are: All Columns, Device,
Host, User, Protocol, Destination, Date/Time, Virus/Attack, VPN, Severity, Rule
Number/ID, Status, URL, Duration, Description, StartTime. You can export the search
result as report in PDF or CSV format using Export as: PDF, CSV link.
Below that, the number of lines of logs displayed are indicated in the Showing : _ to _
of total _ logs field. The number lines displayed per page is indicated in the View per
page : 5 [10] 20 25 50 75 100 250 500 field. Default value is 10. The default
columns displayed are: Host, Protocol, Destination, Date/Time, Status, Severity, and
Description. You can add or remove columns using Configure Columns icon given
above.
Click the
icon against an archived file to delete it.
Once deleted, the archived data cannot be retrieved.
Viewing Data from Archived Files
Once the archive is fully loaded, click the Report link to search for specific data in the
archive. In the popup window that opens, enter the criteria for the data, such as the
firewall, user name, protocol, etc. You can enter a maximum of three criteria.
Choose the time interval for which you want to see the data that meets all the criteria.
Click Generate Report to view the records that match the criteria that you have
specified.
Changing Archive Settings
Click the
Archive Settings link to change the archiving intervals or to disable
archiving. In the File Archive Settings popup window, uncheck the Enable Raw Logs
Archiving check box to disable file archiving.
Log files are archived at specific interval configured in this screen.
Komentarze do niniejszej Instrukcji