Follow these steps to view and analyze the activity of
users on your network.
You can use the ACC, URL filtering reports,
and logs that are generated on the firewall to track user activity.
For a quick view of the most common
categories users access in your environment, check the
widgets allow you to sort on URLs. For example,
in the Application Usage widget, you can see that the networking category
is the most accessed category, followed by encrypted tunnel, and
ssl. You can also view the list of
sorted on URLs.
and configure log options:
From the ACC, you can jump directly to the logs (
) or select
The log action for each entry depends on the Site Access
setting you defined for the corresponding category:
—In this example, the computer-and-internet-info category
is set to alert.
—In this example, the insufficient-content
category is set to continue. If the category had been set to block
instead, the log Action would be block-url.
Alert log on encrypted website
—In this example, the category
is private-ip-addresses and the application is web-browsing. This
log also indicates that the firewall decrypted this traffic.
You can also add several other columns to your URL Filtering
log view, such as: to and from zone, content type, and whether or
not a packet capture was performed. To modify what columns to display,
click the down arrow in any column and select the attribute to display.
To view the complete log details and/or request a category change
for the given URL that was accessed, click the log details icon
in the first column of the log.
Generate predefined URL filtering reports on URL categories,
URL users, Websites accessed, Blocked categories, and more.
URL Filtering Reports
select one of the reports. The reports cover the 24-hour period
of the date you select on the calendar. You can also export the
report to PDF, CSV, or XML.