Choose the
Database
to use
as the source for the custom report—in this case, select
Threat
from
either of the two types of database sources,
summary databases and Detailed logs. Summary
database data is condensed to allow a faster response time when
generating reports. Detailed logs take longer to generate but provide
an itemized and complete set of data for each log entry.