Threat logs display entries when traffic matches one
of the Security
Profiles attached to a security rule on the firewall. Each
entry includes the following information: date and time; type of
threat (such as virus or spyware); threat description or URL (Name
column); source and destination zones, addresses, source and destination
dynamic address groups, and ports; application name; alarm action
(such as allow or block); and severity level.
A dynamic address group only appears in a log if the rule
the traffic matches includes a dynamic address group. If an IP address
appears in more than one dynamic address group, the firewall displays
up to five dynamic address groups in logs along with the source
To see more details on individual Threat log entries:
beside a threat
entry to view details such as whether the entry aggregates multiple
threats of the same type between the same source and destination
(in which case the Count column value is greater than one).
If you configured the firewall to Take
Packet Captures, click
beside an entry
to access the captured packets.
The following table summarizes the Threat severity levels:
Serious threats, such as those that affect
default installations of widely deployed software, result in root
compromise of servers, and the exploit code is widely available
to attackers. The attacker usually does not need any special authentication credentials
or knowledge about the individual victims and the target does not
need to be manipulated into performing any special functions.
Threats that have the ability to become
critical but have mitigating factors; for example, they may be difficult
to exploit, do not result in elevated privileges, or do not have
a large victim pool.
WildFire Submissions log entries with
a malicious verdict and an action set to allow are logged as High.
Minor threats in which impact is minimized,
such as DoS attacks that do not compromise the target or exploits
that require an attacker to reside on the same LAN as the victim,
affect only non-standard configurations or obscure applications,
or provide very limited access.
Threat log entries
with a malicious verdict and an action of block or alert, based
on the existing WildFire signature severity, are logged as Medium.
Warning-level threats that have very little
impact on an organization's infrastructure. They usually require
local or physical system access and may often result in victim privacy
or DoS issues and information leakage.
profile matches are logged as Low.
WildFire Submissions log entries with a grayware verdict
and any action are logged as Low.
Suspicious events that do not pose an immediate
threat, but that are reported to call attention to deeper problems
that could possibly exist.
URL Filtering log entries
are logged as Informational.
WildFire Submissions log entries with a benign verdict and
any action are logged as Informational.
WildFire Submissions log entries with any verdict and an
action set to block and forward are logged as Informational.
Log entries with any verdict and an action set to block are
logged as Informational.