A log is an automatically generated, time-stamped file that provides an audit trail for system
events or network traffic events that
Prisma Access
monitors. Log entries contain
artifacts, which are properties, activities, or behaviors associated with the logged
event, such as the application type or the IP address of an attacker. Each log type
records information for a separate event type. For example,
Prisma Access
may
generate a Threat log to record traffic that matches a spyware, vulnerability, or
virus signature.
Prisma Access (Managed by Strata Cloud Manager)
provides Network logs (such as Traffic, Threat,
URL, File, HIP Match), Endpoint logs, and Common logs (System and Configuration).You
can view details for each log entry, and for threat logs, you can review threat
details and see if there are any threat overrides in place.