Log data can be broadly grouped into two types: those that detail
information on traffic flows on your network such as applications,
threats, host information profiles, URL categories, content/file
types and those that record system events, configuration changes,
and User-ID™ mapping information.
Based on the log forwarding configuration on the managed firewalls,
the tab
can include logs for traffic flows, threats, URL filtering, data
filtering, host information profile (HIP) matches, and WildFire™
submissions. You can review the logs to verify a wealth of information
on a given session or transaction. Some examples of this information
are the user who initiated the session, the action (allow or deny)
that the firewall performed on the session, and the source and destination
ports, zones, and addresses. The System and Config logs can indicate
a configuration change or an alarm that the firewall triggered when
a configured threshold was exceeded.