
25
©
SOLIDA SYSTEMS INTERNATIONAL 2017
9. Events and Event Severity
9.1 Event Overview
Each time a network packet registers a hit with a blacklist entry or a detection rule, an “event” is
generated. An event contains information that describes what caused the event to be
generated. The IP address of the offending packet is included, as well as a short description of
the meaning of the event and a timestamp.
Events are stored in a database in the appliance to allow for tracking and statistics gathering.
Events are also written to log files that can easily be downloaded from the appliance through
the GUI. These event files can then be correlated with other downloadable packet log files, so
that a security analyst can investigate the root cause of the event.
Events can be monitored using the built-in monitoring application.
Figure 9.1 Event summary view in the GUI monitoring application.
Located in the right side of the Packet Events bar is a drop down list. This list shows available
event files in the appliance. Events are written into files that are rotated to avoid them growing
too large. Event files are rotated on a daily basis (at midnight) or once an event file reaches 10
Mbytes in size. A rotated event file will have a time stamp appended to its file name.
An example would look as follows: