HP Sygate Security Agent User Guide
Table 6.
Security Log Parameters and Description
Name of
Parameter
Description
MAC
Application
Name
Name of the application associated with the attack
User Name
User or Computer client that sent or received the traffic
Domain
Domain of the user
Security
Security level for the Agent, set to either
Block All
or
Normal
.
Occurrences
Number of occurrences of the attack method
Begin Time
Time the attack began
End Time
Time the attack ended
Description and Data Fields for the Security Log
Below the rows of logged events are the
Description
and
Data
fields. When you click an
event row, the entire row is highlighted. A description of the event, such as “Somebody is
scanning your device, with 13 attempts,” appears in the
Description
field.
Figure 3. Security Log
Traffic Log
Whenever your device makes a connection through the network, this transaction is recorded
in the Traffic Log.
30