Reporting Engine Enhancements
Accurate log directionality
Firewall writes logs from the perspective of who initiated the network interaction or event. For example, if you are downloading a file from a website, the threat log describes the source (SRC) of the network interaction as the individual requesting the download and describes the destination (DST) as the website from which the source is downloading the file. The client is the entity that initiates the request while the server is the entity that receives the request.
Overlay of commits and content updates in the ACC
User events in the
ACC, such as commits and content updates, are represented as a dotted line on all time-trended line graphs. This helps you to correlate commits and upgrades with suspicious network events.
Filters for User Activity Reports
Filter Builderto build custom filters (
User Activity Report
On Demand Report Scheduling
Run Nowfor a scheduled report or
Pick up Laterto return at a later time to retrieve the report instead of waiting for a an on-demand report to generate.
You can also run a
Background Reportto export the generated report in your desired format (
). You can save only one report for pick up at a time.
Manage Custom Report
Custom reporting enhancements
Custom reporting is now more user friendly: