![Symantec 10268947 - Network Security 7160 User Manual Download Page 100](http://html1.mh-extra.com/html/symantec/10268947-network-security-7160/10268947-network-security-7160_user-manual_1418779100.webp)
100 Incidents and Events
Monitoring events
Note:
Both StandardUsers and RestrictedUsers can modify the view by selecting
which columns to display, sorting columns, and applying view filters.
Selecting event columns
Not all events contain data in every category, so you may want to remove empty
or irrelevant columns, or add others to customize the display. All users can
modify the display of event information by selecting columns.
To select event columns
1
In the
Incidents
tab, in the lower
Events at Selected Incidents
pane, click
Columns
.
2
In
Table Column Chooser
, do one of the following:
■
Click
Select All
to select all columns.
■
Click the individual columns you want to view.
3
Click
OK
to save and close.
The
Events at Selected Incident
can display the following information:
■
Time
Indicates the date and time when Symantec Network Security first
detected and logged the event.
■
Event
Type
Indicates the event category of the detected event.
■
Name
Indicates the user group of the current user.
■
Source
Indicates the IP address of the packet that triggered the event. If
the source is made up of multiple addresses, then the Network
Security console displays
(multiple IPs)
and you can view the
list of addresses by double-clicking the event to see Event Details.
■
Destination Indicates the IP address of the attack target. If the destination is
made up of multiple addresses, then the Network Security console
displays
(multiple IPs)
and you can view the list of addresses
by double-clicking the event to see Event Details.
■
Severity
Indicates the severity level assigned to the event. An event’s
severity is a measure of the potential damage that it can cause.
Summary of Contents for 10268947 - Network Security 7160
Page 1: ...Symantec Network Security User Guide...
Page 18: ...18 Introduction Finding information...
Page 34: ...34 Architecture About management and detection architecture...
Page 46: ...46 Getting Started About deploying node clusters...
Page 64: ...64 Topology Database Viewing objects in the topology tree...
Page 124: ...124 Log Files About log files...
Page 134: ...134 Index...