A log is an automatically generated, time-stamped file
that provides an audit trail for system events on the firewall or
network traffic events that the firewall monitors. Log entries contain
artifacts,
which are properties, activities, or behaviors associated with the
logged event, such as the application type or the IP address of
an attacker. Each log type records information for a separate event
type. For example, the firewall generates a Threat log to record
traffic that matches a spyware, vulnerability, or virus signature
or a DoS attack that matches the thresholds configured for a port scan
or host sweep activity on the firewall.