en-US
search-icon

GMS 8.3 Admin Guide

Reporting

Overview of Reporting

This describes how to use SonicWall™ Global Management System (GMS) reporting, including the type of information that can appear in reports. A description of the available features in the user interface is provided.

This includes the following:

GMS Reporting Overview

An essential component of network security is monitoring critical network events and activity, such as security threats, inappropriate Web use, and bandwidth levels. GMS Reporting complements SonicWall's Internet security offerings by providing detailed and comprehensive reports of network activity.

The GMS Reporting Module creates dynamic, Web-based network reports from the reporting database.

The GMS software application generates both real-time and historical reports to offer a complete view of all activity through SonicWall Internet security appliances. With SonicWall GMS Reporting, you can monitor network access, enhance security, and anticipate future bandwidth needs.

You can create Custom reports by using the report filter bar, available in most report screens in the SonicWall GMS management interface. The report Filter Bar provides filters to allow customized reporting, including pre-populated quick settings for some filter fields. A Date Selector allows paging forward and backward in time, or selecting a particular time period for viewing, through a pull-down calendar. The search operator field offers a comprehensive list of search operators that varies depending on the search field that can be either text-based or numeric. Refer to Layout of Reports Display to see these items in the context of the Report page.

You can search all columns of report data except columns that contain computed values, such as %, Cost, or Browse Time. GMS waits until you click Go before it begins building the new report.

The GMS Reporting Module provides an interactive interface that:

Displays bandwidth use by IP address and service
Identifies inappropriate Web use
Provides detailed reports of attacks
Collects and aggregates system and network errors
Shows VPN events and problems
Tracks Web usage by users and by Web sites visited
Provides detailed daily firewall logs to analyze specific events.

Viewing Reports

The GMS Reports view under the Firewall, SMA, and Email Security (ES) tabs is divided into three panes, as shown below: the TreeControl Pane, the middle pane with the Policies and Reports tabs, and the Reports pane.

TreeControl Pane — A list of views and individual units referred to as the TreeControl. In the left pane, you can select a top level view, a group view, or a unit to display reports that apply to the selected view or unit. GlobalView is the default top level selection.
List of Reports — The middle pane provides two tabs: Policies and Reports. The Reports tab contains a list of available reports that changes according to your selection in the TreeControl pane: GlobalView provides a general summary of various functions, and unit view provides specific details. The reports are divided into categories. You can click on the top level report in a category to expand it to view the list of reports in that category, then click on an individual report name to view that report. To keep a category in expanded view, click on the category while pressing the Ctrl key. Otherwise, the expanded entry collapses when the next entry is expanded.
The Reports Pane — The right pane displays the report that you selected in the middle pane for the view or unit that you selected in the TreeControl. For most reports, a search bar is provided at the top of the pane. Above the search bar, a time bar is provided. You can view the report for a particular time by clicking right and left arrows, or clicking on the center field to get a pull-down menu with more options. Click on icons in the upper left corner to send the report to a PDF or UDP file. These files can then be printed for reference. A quick link to the Universal Scheduled Reports menu is also provided, allowing you to set up scheduling and other functions.

Navigating GMS Reporting

GMS Reporting is a robust and powerful tool you can use to view detailed reports for individual SonicWall appliances or groups of appliances.

This section describes each view and what to consider when making changes. It also describes the Search Bar and display options for interactive reports, as well as other enhancements provided in GMS. See the following sections:

Global and Group Views

From the Global and Group views of the Reports Panel, Initiators reports are available for all SonicWall appliances within a group or all SonicWall appliances being managed by GMS. The Initiators Report provides a high level report for all appliances. More detail is available from the Unit view.

To open the Global or Group view, click the GlobalView icon in the upper-left hand corner of the left pane or select a Group Icon. The global view Data Usage > Initiators page displays.

Initiator pages are available for the major functions on the middle pane. By default, they display both the Chart View and Grid View. You can use the toggle buttons to the right to display either view, or both.

* 
NOTE: The selected Chart of Grid view remains in effect only for the specified screen. Changing screens defaults back to the Chart and Grid View.

Layout of Reports Display

The Report Display is comprised of the following areas:

The Filter Bar area that includes the Time Bar, Export buttons and Custom Reports buttons, and data filter functions
Report Data Container that contains the Chart and/or Grid Views

The figure that follows shows the layout of the Report:

The Report displays the following areas:

Date Selector
Filter Bar
Export Results:
Schedule Report: brings up the Universal Scheduled Reports menus. For more information, refer to Using the Universal Scheduled Reports Application.
Export to CSV
Export to PDF
Save Report
Load Custom Report
Reload Data Chart/Graph View — GMS provides interactive reports that create a clear and visually pleasing display of information. You can control the way the information is displayed by adjusting the settings through toggles that allow you to display a graphical chart, a grid view containing the information in tabular format, or both (default).
Report Data Container — consists of the Chart View and the Grid View, the Show Chart, Show Grid, and Show Chart and Grid toggle buttons, and the Reload Data button.
* 
NOTE: The Chart view is clickable. You can drill down to Detail sections simply by clicking on areas of interest in the bar-chart or pie-chart.

The Date Selector

The Date Selector allows you to generate a report for only a specific date and time range. Use the right and left quick-link arrows to move backward and forward in time, a day at a time. Clicking the time field on the Date Selector brings up a pull-down menu that allows you to customize your time and date ranges.

Setting a Date or Date Range

By default, summary reports display only information for a single date. However, by using the Time Selector pull-down menu, you can fine-tune the time, date, or range of times and dates you want to see. Over-time reports display information over a date range.

The Time Selector allows you to specify any time or date interval desired, whether by day, or in hour/minute intervals. To select a single date for a report, either use the Date Selector bar and the left and right arrows to page through reports by date, or click on the displayed date field in the Time Selector to display the pull-down schedule menu.

You can select from:

Last 1 hour
Last 6 hours
Last 12 hours
Today - 00:00 to 23:59
Yesterday - 00:00 to 23:59
Last Week - the previous 7 days, from 00:00 to 23:59
Custom - a custom time and date range

In the pull-down schedule menu, you can specify a recent time snapshot, or click on Custom to select the starting and ending dates and times. The Custom option allows you to select a specific time and date or range from the Interval menu.

1
To set up a custom time range, click in the Time Selector Bar. The Interval pull-down menu appears.

In the Interval menu, you can either set the date manually or by using the pull-down calendar. In the calendar, you can set the month by clicking the desired dates. If no data is available for a specific date, that date is not available (grayed out).

2
Set a specific start and ending time by specifying hours and minutes you want to monitor. The default for a date is an interval starting at hour 0 minute 0 (midnight) and ending at 23:59 (11:59 PM).
3
The Interval menu also lets you set how many lines of information appears in the graph view. Click the date, and when the Interval pull-down appears, specify the number of rows. Select 5, 10, 20, 50, or 100 from the Rows pull-down list to limit the display to a the specified number of lines, for easier viewing.
4
Click OK to generate the report.

Sorting Report Data

Report data is sorted and ranked according to how many rows are displayed. By specifying a limited number of rows to be displayed in the graph section of the Report, rankings apply only to the data in those rows. If you reverse the sort order by clicking on the column bar, only the displayed items are re-sorted.

To re-sort according to all collected data in the database, click Enable Server Side Sort on the pull-down menu. The ranking of the grid items then reflects all data from the total entries.

By default, Client-side Sort is used that sorts only the currently viewable data that was retrieved the first time the data base was clicked on.

For example, the snapshot that follows shows data displayed only as it pertains to ten rows.

If you re-rank the column to see the lowest number of hits, it ranks only the items displayed in the ten rows you selected.

Use Enable Server Side Sort to sort data based on all underlying data records, not the client-side sort. Server side Sort retrieves current data from the back end database. Client-side sort merely rearranges the data already retrieved. You can still constrain your display to 10 rows, but the display will re-sort based on the total data collected in the back-end database, and not just the data previously displayed.

Unmask Reports

IPs, user names, and host names in reports might be masked if the Super Admin has the Data Privacy Settings feature enabled.

To unmask reports, click the Unmask icon in the report’s tool bar (this icon is only available if the Super Admin/User gives you permissions to unmask reports).

A pop-up window displays, asking for your credentials and another user’s credentials from the same domain that has privileges to unmask reports.

After the correct credentials are entered, all reports in the management interface are unmasked for that login session only.

To enable Data Privacy Settings, refer to Enabling Data Privacy Settings

To allow permissions to unmask reports, refer to Configuring Action Permissions.

Export Results

The Export to PDF and Export to CSV icons allow you to save a report in either PDF or Excel format.

These buttons provide the following export options:

Export to PDF — This button allows you to save the displayed report data to a PDF file. The PDF can export a maximum of 2500 rows.
Export to CSV — This button allows you to send the report to a file in Microsoft Excel Comma Separated Value (CSV) format. Excel can export a maximum of 10,000 rows.
* 
TIP: To print a report, export it to PDF, using Export to PDF, then print out the PDF file.

If a very large report file, such as a system log, is being exported, the number of lines that can be saved is limited. When you click the icon, you will see a message like the following:

Select whether to print only the currently-displayed screen, or the maximum number of rows.

The Filter Bar

The Filter Bar provides filtering functions to narrow search results, to view subsets of report data.

The Filter Bar is at the top of the Report. It contains the Add Filter (+) button for adding filters and a Go button to apply filters, as well as the Clear Filter button to clear all filters.

Using the Filter Bar allows you to view subsets of the report data, based on a set of pre-defined filters.

Adding Filters

Filters can be added in two ways, either explicitly through the Filter Bar, or implicitly by clicking on the hyperlinks in the grid sections of a displayed report. As hyperlinks are clicked, those link criteria are added to the Filter bar as if it was added explicitly. Refer to Adding Filters Implicitly for more information.

Use the Filter Bar to add pre-defined filters from a pull-down menu and to specify parameters for those filters. Filter values will be matched in the database during report generation.

Click Add Filter (+) on the left to display a pull-down menu that can then be used to fine-tune the report data by selecting categories.

Filters can also be added by right-clicking on a column entry and selecting the Filter option from the pull-down menu.

Filter criteria are context-dependant, meaning that GMS finds the specific filter operators applicable to the entry. Many filter operators are used in connection with a text string or numeric filter input value that determines what data to include in the report. This control uses auto-complete to suggest a set of candidate values, or you can manually enter a different value. Manually-entered values should be checked for blanks, illegal characters, and so on.

Operators are specified by clicking on the default operator to bring up the pull-down menu of available operators.

Depending on the selected field type, text string or numeric, several filter operators are available. The filter operators are used with a filter input value to restrict the information displayed in the Detail report.

The operators are defined in the table that follows:

 

Operators

Operator

Definition

=

Only data that exactly matches the filter input numerical value are included in the report

!=

Data values that are not equal to the input numerical value are included in the report

>

Data values that are greater than the input value are included in the report.

>=

Data values that are greater than or equal to the input value are included in the report.

<

Data values that are less than the input value are included in the report.

<=

Data values that are less than or equal to the input value are included in the report.

IN

Data values that are in the input value are included in the report.

NOT IN

Data values that are not in the input value are included in the report.

LIKE

Data values that are like the input value are included in the report.

NOT LIKE

Data values that are not like the input value are included in the report.

IS

Data values that match the input values are included in the report. Use IS with two values separated by a dash, with spaces on both sides of the dash, to match values that are in range between the two input values.

IS NOT

Data values that are not in the specified range are included in the report. Use the IS NOT operator with two values separated by a dash, with spaces on both sides of the dash, to exclude values between the two input values.

You can also use wild-cards (*) in filters to match anything. For instance, you might want to match a user name. You would select LIKE as the operator, and use * in connection with a string. For example, “joh*” would match all users starting with “joh” such as John, Johnny, Johan, and so on.

Using the Filter Bar

Use the Filter Bar to manually (explicitly) add filters.

To add a filter:
1
Click the Add Filter (+) menu and select a filter from the drop-down menu. Available Filter categories can differ, depending on the report, and could require parameters.
* 
NOTE: Some filter fields use operators with text or numeric values. Others might have pre-filled values. For example, the Initiator Country filter displays a pull-down list, allowing you to display results based on a selected country. You can create reports with filters on VLAN Interfaces by using the Interface Filter (Source or Destination), and using the VLAN interface name with ‘:’ replaced by ‘-’. VLAN Interfaces typically are as follows: X8:V100, X0:V20, and so on. When VLAN interface information is sent in the syslogs, the character ‘:’ is replaced with ‘-’. So, you must use values such as X8-V100, X0-V20 in the Interface filters.
2
Click Go (right-hand arrow) to add a filter Each filter must be applied by clicking on Go before you can select and apply the next filter. The filter bar shows all filters added, whether added from the menu bar or pull-down menu.

As filters are added, items that have been filtered out disappear from the listings, reappearing only when the associated filter, or all filters, are removed.

3
To remove a filter, click the + (plus) next to the filter in the menu bar and click Go (right arrow). To clear all filters, click the Clear Filter (x) next to the filter fields.

Adding Filters Implicitly

GMS also allows adding filters directly to a drillable (hypertext-linked) column to create a “criteria control,” where you can set a value for the filter. Adding a filter to a column allows you to restrict the display to view only the data related to the entry of interest.

In second-level reports with multiple subsections, filters can be added simply by clicking on the hyperlinked data in the report section.

To add a filter to a “drillable” column containing hypertext links:
1
Right-click on a hypertext column cell and select Add Filter from the resulting pull-down context menu.

Because the filter is context-sensitive, it might suggest a set of candidate values, or you can manually enter a different value. A new filter is automatically added to the filter bar, and the report is updated accordingly.

After added, the filter is added to the filter area of the Search Bar and no longer appears in the pull-down list. The report displays only results restricted by that filter.

2
To remove the filter, click the x next to that filter, or clear all filters by clicking the red X to the right of the field.

Saving/Viewing a Filtered Report

The Save Report pop-up menu allows you to save the currently-displayed report with a specified name of no more than 20 characters. You can also overwrite an already-saved report with the current report or overwrite the report to show a new date range.

Saved reports, even if created for a specific unit, are available for all units of that appliance type. For example, if a report for the X1 interface was created for a specific unit, this report is available from any unit: there is no need to create a X1 report for different units.

* 
NOTE: Custom Reports created by a specific user are viewable by that user, and no one else. Domain Administrators can view all available reports.
To save a report, along with its filter criteria:
1
Click Save Report.
2
Assign it a file name for later reference.
3
To view a saved Custom Report, click Custom Reports to bring up a menu that contains a list of all saved Custom reports available for viewing. Selecting a Custom Report from this pull-down loads data for the selected report into the Report Data Container.
4
You can also load a saved report from the Report tab on the middle bar menu. Click Custom Reports on the Reports tab and select the desired report to load it into the Data Container.
5
Click on the appropriate Export Results icon to save a report to a PDF file or Excel spreadsheet. To print a copy of the report, click on the PDF icon and save it to a file, then print the PDF file.
* 
TIP: Saved Reports can be modified or deleted by clicking Custom > Manage Reports.

Scheduling Reports

You can schedule a report to be created and sent to you in email, using the Universal Scheduled Reports function. For more information, refer to Using the Universal Scheduled Reports Application.

The Schedule Reports icon is located to the right side of the toolbar above the Load Custom Reports button.

Click this icon to bring up the Universal Scheduled Report Configuration Manager.

When the Configuration Manager menu comes up, it is pre-filled with the information about the current Reports page. Using this report, you can set up specific tasks, chose the format for the report, and other options. For more information on using Universal Scheduled Reports, refer to the section: Universal Scheduled Reports.

Report Data Container

The Report Data Container is the screen space where the report data is displayed.

GMS provides interactive reporting to create a clear and visually pleasing display of information in the Report Data Container. The Root-level baseline report shows the Chart View, usually containing a timeline or a pie chart and a Graph View.

You can control the way the information is displayed by adjusting the settings through toggles or by configuring reports in the dashboard interface.

Reports have a Date Selector and Filter Bar at the top, with the Report Data Container below it.

Detail-level reports are available either by “drilling down” on hyperlinks in the Root-level view, or, for some types of Reports, as a shortcut on the Report tab.

* 
NOTE: Cell data in the report container can be copied by right-clicking the cell and selecting Copy Cell Data from the pull-down menu.

Layout of the Data Container

The Report Data Container is comprised of a number of Sections. Sections are usually arranged vertically stacked on top of each other. Each section has a “Title Bar” that contains the “Section” title on the left and a group of buttons on the right. The Report itself might contain one or more Sections of data that are different facets of the report data.

* 
TIP: At times, you might wish to see multiple screen groups at the same time. Ctrl-click to keep a previously-expanded topic from collapsing when you select a new report category. For example, you might want to view Data Usage, Applications, and Intrusions simultaneously, to see what detail sections are available. Control-click on these entries to see all the screen groups under these entries simultaneously.
 
* 
NOTE: Root level reports available in the Reports panel usually contain only one section.

The Report Data Container sections either appear as a chart view, a grid view, or both.

The default display mode is Show Chart and Grid. In this mode, the data is available for viewing as both a ‘Chart’ and a ‘Grid.’ This layout can be controlled by switching between 3 display mode options, any of which can be turned on/off at any time, using the utility toggle button group on the Section Title Bar.

The display modes available on this layout are:

Show Chart: In this mode only the chart is visible and takes up all the available space inside the section container. Charts show a timeline or pie chart.
Show Grid: In this mode only the Grid is visible. The Grid Display might contain more than one Section,
Show Chart and Grid: In this mode both the chart and the grid are visible and are vertically stacked.
Switching between these modes is handled through the utility toggle buttons.

Only one mode can be active at a time.

Reload Data is present on the title bar in all the layouts described previously. Clicking this button instructs the application to refresh the section data.

You can determine if you have reached the final section in a multi-section Grid View by checking if there is a message about the relevant time-zone at the bottom left of the report. If this message is present, there are no more Grid sections available.

Viewing Syslog Data of Generated Reports

Different types of section data are available under the root-level report. The section level reports are available through the Details entry on the middle pane Reports tab, for some Reports. You can also drill down from the root level report to the second level Detail views, containing multiple subsections, by right-clicking a hyperlink and selecting “Drilldown” from the pull-down menu. The syslog fields corresponding to the applied filter will come up.

Drilling Down

Sections in the Grid display might contain drillable columns, containing hypertext links to bring up a Detail Report. A ‘drillable’ column appears as a column in the data grid, where the child values appear underlined and in blue, and act as a hyperlink to additional information. Click any of these values to drill down to another report, using the value on which drill-down has been executed as a filter. When you click on a drillable link, this filter is added to the Filter Bar.

Drilling down navigates to a new Detail report, filtered by the data on which the drill-down was executed. Drillable reports can display multiple grid sections in the sub-reports, or bring up a System Analyzer view, depending on the item selected.

The following example illustrates how you can drill down through the Data Usage Report by clicking on a drillable entry to gain more information and filter the results.

1
Click on an appliance, then click Data Usage on the Reports tab. You see a timeline showing connections.

2
Click on a hyperlinked Time to go to the Detail view of the Report. The Detail view contains multiple sections, including Initiators, Services, Responders, Initiator Countries, and Responder Countries. Depending on the number of entries, you might need to scroll down to see all the sections.
* 
NOTE: You can also apply a filter through the Filter Bar or by right-clicking the entry. Select the filter and click Go. The Report shows the detail view applicable to that filter.

3
To further filter the output, to view only tcp/https usage, click on the tcp/https entry under Services. A Details report, filtered to show only usage of tcp/https, comes up. Notice that a Service entry has been added to the Filter Bar.

Notice that the Report now focuses on the filter constraint from the drilled-down column.

Because this report also contains drill-down areas, you can drill down even further to add additional constraints to the results.

* 
NOTE: Many report categories contain a Details item in the list of reports. This link provides a shortcut directly to the Detail view of all sub-sections of the report. You can apply filters directly to the Detail view to further constrain the displayed information.

The Log Analyzer provides the most detailed Report information.

4
To view the Log Analyzer, go to the Reports tab after you have drilled down to the desired level of detail and click on Analyzers > Log Analyzer.
* 
NOTE: Because Log Analyzer Reports can contain a very large amount of data, you might wish to limit the amount of data displayed on the page. The amount of data in the report can also affect the loading speed.

The Log Analyzer contains information about each connection, including port and interface information, number of Bytes sent, and so on.

You can drill down through the Log Analyzer Report as well. Clicking on a column item adds an additional filter and narrows down your results, allowing you to zoom in on specific instances.

Some Log Analyzer reports can be reached as the final step of a drill down process.

Click on a row to expand the log, additional information can be viewed here:

The bottom bar of the Log Analyzer contains a page bar that allows you to navigate through the report by paging forward and backward, or going to the specific page of interest.

Custom Reports

Specific customized reports can be generated and saved by means of the Save icon. Click Save to bring up a drop down allowing you to save a custom report.

This menu is pre-filled with a name reflecting the report it was based on. If an earlier report with this name was generated, you can choose to overwrite it or save a new copy, or assign it a different name.

The new Custom report is added to the pull-down menu accessed when you click Load Custom Report. It is also added to the Reports Tab list under Custom. When a specific Custom report is selected on the Load Custom Report pull-down menu, the button reflects the name of that report.

Custom Reports can also be accessed or deleted by going to Reports > Custom > Manage Reports.

Troubleshooting Reports

One of the most common reasons when a report does not display is that no data is available for the selected appliance. There are several reasons why you might see this error. GMS displays the most likely reason(s) and gives you instructions for ways to resolve the problem.

The most common examples are shown below.

Appliance is in a Provisioned State:

GMS is waiting for a handshake response signal from the appliance. Generally, the TreeControl menu also flags the appliance with a lightning bolt on a yellow background.

Appliance is Down

No Matching Records Found

There might be no data available for a variety of reasons. The most common causes are listed in this message, along with actions to take.

Managing GMS Reports on the Console tab

There are management settings for the GMS Reporting Module on the GMS Console tab. A Reports selection is available on the left menu bar that allows you to set up certain tasks in the right Management pane that contains limited configuration screens, used for managing scheduled email report configuration, system debug-level logging, and show legacy reports.

In this pane, you can set Summarizer parameters and schedule emailing or archiving of reports.

Data deletion or storage specified in these menus takes place after completion of the current reports run.

For information about GMS management settings, see Configuring Management Settings.
For information about user screen permissions, see Moving a User.

Reports generated by pre 7.0 releases of GMS can still be viewed, but require specific configuration. See Managing Legacy Reports.

Managing Firewall Reports

This describes how to generate reports using the SonicWall™ Global Management System (GMS) Reporting Module. The following describes how to configure the settings for viewing reports:

Firewall Reporting Overview

The Reports available under the Firewall tab provide specific information on data gathered by the GMS interface.

For a general introduction to reporting, see GMS Reporting Overview.

The Firewall reports display either summary or unit views of connections, bandwidth, uptime, intrusions and attacks, and SMA usage, displayed in a Data Container. Information can be viewed in either chart (timeline or pie chart) form, or tabular (grid) format. The list of available reports allows you to navigate to a high-level or specific view.

All of the reports in GMS report on data gathered on a specific date or range of dates. Data can be filtered by time constraints and data filters.

Benefits of Firewall Reporting

Firewall Reports allow you to access both real-time and historical reports and view all activity on SonicWall Internet security appliances. By monitoring network access, logins, and sites accessed, you can enhance system security, monitor Internet usage, and anticipate future bandwidth needs.

You can gain more information from the display, simply by hovering the mouse pointer over certain sections. Additionally, by clicking on selected sections of a pie chart or bar-graph timeline view, you can view more information or view different aspects of the information presented.

Firewall Reports Tab

The Firewall tab gives you access to the Firewall’s reports section of the GMS management interface. Reporting supports both graph and non-graph reports, and allows you to filter data according to what you wish to view. It supports multiple product-licensing models.

Firewall Reports provide the following features:

Clickable reports with drill-down support on data rows
Report data filtering through the Search Bar
Log Analyzer

You can view Reports either as Summary reports for all or selected units on the GMS network, or view detailed reports for individual units.

Viewing Available Firewall Report Types

To view the available types of reports for the Firewall appliances, complete the following steps:
1
Log in to your GMS management console.
2
Click the Firewall tab.
3
Select an appliance, global view, or group of appliances from the TreeControl.
4
Click the Reports tab on the top of the screen.
5
Expand the desired selection on the Reports list and click on it.
* 
NOTE: All Reports show a one-day period unless another interval is specified in the Time Bar.

The following types of reports are available:

Global Level Reports:

Data Usage
Summary: connections, listed by appliance, for one day (default)
Applications
Summary: connections, listed by application, for one day (default)
Web Activity
Summary: hits, listed by appliance, for one day (default)
Web Filter
Summary: access attempts, listed by appliance, for one day (default)
VPN Usage
Summary: VPN connections, listed by appliance, for one day (default)
Threats
Summary: connection attempts, listed by appliance, for one day (default)
* 
NOTE: Summary Reports are not drillable and no Detail view is available.

Unit Level Reports

Detail views are available for all Report items unless otherwise noted.

Data Usage
Timeline: connections for one day (default)
Initiators: Top Initiators, listed by IP address, Initiator Host, Initiator MAC, User, Connections, and Responder, displayed as a pie chart
Responders: Top Responders, listed by IP address, Responder Host, Responder MAC, and Connections, displayed as a pie chart
Services: connections, listed by service protocol, displayed as a pie chart
Details: provides a shortcut to the Detail view normally reached by drilling down. Detail sections include: Initiators, Services, Responders, Initiator Countries, and Responder Countries. Additional filtering or drill down takes you to the Log Analyzer
Applications
Data Usage connections, listed by application and threat level
Detected: events, listed by application and threat level
Blocked: blocked events, listed by application and threat level
Categories: types of applications attempting access
Initiators: events displayed by Initiator IP and Initiator host
Timeline: events over one day
User Activity
Details: a detailed report of activity for the specified user
Web Activity
Categories: hits and browse time listed by information category
Sites: sites visited by IP, name, and category, with hits and browse time
Initiators: Initiator host and IP with category and user
Timeline: site hits with time of access and browse time
Details: provides a shortcut to an access timeline and Detail view normally reached by drilling down. Detail sections include: Categories, Sites, and Initiators.
Web Filter
Categories: hits and browse time listed by information category
Sites: sites visited by IP, name, and category, with hits and browse time
Initiators: Initiator host and IP with category and user
Timeline: site hits with time of access and browse time
Details: provides a shortcut to an access timeline and Detail view normally reached by drilling down. Detail sections include: Categories, Sites, and Initiators.
VPN Usage
Policies: lists connections by VPN Policy
Initiators: Initiator host and IP with category and user
Services: Top VPN Services by Service Protocol
Timeline: VPN connections over a 1 day period
Intrusions
Detected: number of intrusion events by category
Blocked: blocked intrusions and number of attempts at access
Targets: number of intrusion events by target host and IP
Initiators: Initiator host and IP with category and use
Timeline: intrusions listed by time of day
Details: provides a shortcut to an access timeline and Detail view normally reached by drilling down. Detail sections include: Categories, Sites, and Initiators.
Alerts: provides a list of intrusion alerts
Botnets
Initiators: Initiator host and IP with category and use
Responders:
Attacks:
Timeline: Botnets listed by time of day
Geo-IP
Initiator Countries: Initiator country’s host and IP blocked
Responder Countries: Responder country’s blocked
Gateway Viruses
Blocked: blocked virus attacks and number of attempts at access
Targets: targeted hosts and IP addresses
Initiators: initiating users, hosts, and IP addresses of the virus attack
Timeline: times when the virus attempted to gain access, displayed over time
Details: provides a shortcut to an access timeline and Detail view normally reached by drilling down. Detail sections include: Categories, Sites, and Initiators.
Alerts: provides a list of virus alerts
Spyware
Detected: spyware detected by the firewall
Blocked: spyware blocked by the firewall
Targets: targeted hosts and IP addresses
Initiators: initiating users, hosts, and IP addresses of spyware download
Timeline: times when the spyware accessed the system, displayed over time
Details: provides a shortcut to an access timeline and Detail view normally reached by drilling down. Detail sections include: Categories, Sites, and Initiators.
Alerts: provides a list of spyware alerts
Attacks
Attempts: type of attack and times access was attempted
Targets: host and IP address, and number of times access was attempted
Initiators: top attack initiators by IP and host
Timeline: time and number of attempts at access, displayed over time
Authentication: authenticated users, their IP addresses, and type of login/logout
User Login
Admin Login
Failed Login
Up/Down Status
Timeline: provides a timeline of unit availability. No Detail sections are available.
Custom Reports: allows access to saved custom reports
Analyzers
Log Analyzer: provides a detailed event-by event listing of all activity. The Log Analyzer is drillable, but no Detail sections are available.
Flow Activity
Real-Time Viewer: real-time data displayed graphically.
Top Flows Dashboard: displays top flows per report type.
Flow Analytics: monitors applications, users, URLs, initiators, responders, threats, VoIP, VPNs, devices, and contents.
Flow Reports: real-time reports displayed graphically.

Understanding the Data Container

The Report contains a filter bar at the top, plus the actual Data Container. The default Data Container contains an interactive chart view that contains either a grid view, containing a text version of the information. One or more sections might be present in the grid view. Toggle buttons allow you to display the Chart view, Grid view, or Chart and Grid view.

Grid sections are arranged in columns. Columns might be rearranged to view them from the top down or bottom up, by clicking the up and down arrows in the column headings. You can narrow results by applying a filter to a column: right-click on a column heading and click Add Filter.

Hypertext-linked columns are drillable, meaning you can click on the hypertext entry to bring up a Detail view with more information on the desired entry. Detail views might have multiple sections.

The Detail views are usually reflected in the sub-headings under the Reports list, which provide a shortcut directly to the Detail Report. To go to the full Detail view, click the Details entry in the Reports list. From the Detail view, you can access the system logs, for event-by-event information, or further filter the results. For more information on using the Log Analyzer to view and filter syslog reports, see Using the Log Analyzer.

Details views can contain multiple sections. To determine if you have reached the end of the list of sections, check for the time zone message, which indicates the end of the Detail View.

Reports with hyperlinked columns can be filtered on the column or by drilling down on the hyperlinked entry.

You can also get to a filtered Detail view by clicking the section representing the desired information in the pie chart.

To save a filtered view for later viewing, click the Save icon on the Filter Bar. The saved view now appears under Custom Reports.

To learn more about Custom reports, see Custom Reports

How to View Firewall Reports

The Firewall Summary reports display an overview of bandwidth, uptime, intrusions and attacks, and SMA usage for managed SonicWall Firewall appliances. The security summary report provides data about worldwide security threats that can affect your network. The summaries also display data about threats blocked by the SonicWall security appliance.

You can view Firewall Reports as either as global or group summary reports, or by individual unit:

Viewing Global Summary Reports

Summary reports for data usage, applications, web usage and filtering, VPN usage, and threats for managed SonicWall appliances are available at the global level, through the TreeControl menu. Summary reports are available for:

Data Usage
App Control
Web Usage
Web Filtering
VPN Usage
Threats

Group-level Summary reports provide an overview of information for all Firewalls under the group node for the specified period. The report covers the connections and transfers by appliance for Data Usage, App Control, and VPN Usage, For Web Usage and Web Filters, hits are also included. Web filters and Threats list attempts at connection. Unless specified differently in the Date Selector, the Summary report covers a single day. Global Summary reports are not drillable.

To view the Summary report, complete the following steps:
1
Click the Reports tab.
2
Select the global icon or a group of appliances.
3
Click Data Usage > Summary.

The time lines at the top of the page display the totals, and the grid section sorts the information by appliance or applications.

Similar summary reports are available for all the Global or Group reports specified previously.

Viewing Unit Level Status Reports

Unit level reports display status for an individual SonicWall appliance. From this information, you can locate trouble spots within your network, such as a SonicWall appliance that is having network connectivity issues caused by the ISP. You can also monitor web usage, including attempts to reach filtered sites, as well as incoming attacks on your network.

* 
NOTE: Global reports are displayed in the GMS’s timezone. Reports for individual SonicWall security appliances are displayed in the individual appliance’s time zone.

Viewing Data Usage Reports

The default Data Usage report displays a timeline for hours that the selected SonicWall appliance was online and functional during the time period with connections, transferred connections, and cost displayed.

1
Click the Reports tab.
2
Select the global icon, a group, or a SonicWall appliance.
3
Click Data Usage > Timeline. (This is the default view when the Firewall Report interface comes up.)

This report is drillable. Click on an Initiator IP entry to break the Timeline report down into its Detail View report groups for the selected IP address. These groups also contain drillable hyperlinks that takes you to more specific Detail View information. The columns can also be filtered. For more information on drilling down in a report, refer to Drilling Down

The following Section entries are available:

Initiators: Initiators are grouped by IP, Host, User Name, Connections, and Transferred Connections
Responders: Responders are grouped by IP, Host, User Name, Connections, and Transferred Connections
Services: connections from the various services
Details: Provides a shortcut from the Details View

Viewing User Activity Logs

Web User Activity logs allow you to filter results to view only the activity of a specific user.

The User Activity Analyzer provides a detailed report listing activity filtered by user. If a user report has been saved previously, bringing up the User Activity Analyzer displays a list of saved reports under the Filter Bar.

If you wish to create a new report, use the Filter Bar to create a new report.

1
Click the Reports tab.
2
Select a SonicWall appliance.
3
Click on User Activity > Details to bring up the User Activity Analyzer. The User Activity Analyzer generates a Detail report based on the user name.

If no user activity reports were saved, only the Filter Bar displays, with the User filter pre-selected. You can enter a specific user name, or use the LIKE operator wildcards (*) to match multiple names.

4
Enter the name of the user into the field and click Go (arrow) to generate the report.

The customized User Activity Details report displays a timeline of events, Initiators, Responders, Services, Applications, Sites visited, Blocked site access attempted, VPN access policy in use, user authentication, Intrusions, Initiator Countries, and Responder Countries associated with that particular user.

Data for a particular user might not be available for all of these categories.

Viewing Applications Reports

Application Reports provide details on the applications detected and blocked by the firewall, and their associated threat levels.

1
Click the Reports tab.
2
Select a SonicWall appliance.
3
Click Applications > Data Usage.

The Applications Report displays a pie chart with the application and threat level it poses.

You can drill down for additional Details views on connections over time (Timeline view), Data Usage, Detected applications, Blocked applications, Categories of applications, top initiators.

Viewing Web Activity Reports

Web Activity Reports provide detailed reports on browsing history.

1
Click the Reports tab.
2
Select a SonicWall appliance.
3
Click Web Activity > Categories.

The Web Activity Report displays a pie chart with the Top Categories of type of access, total browse time, and hits.

You can drill down for additional Details views on connections over time (Timeline view), Sites visited, Categories of sites, and Top Initiators. A Details entry links directly to the details view of all entries.

Viewing Web Filter Reports

Web Filter Reports provide detailed reports on attempts to access blocked sites and content.

1
Click the Reports tab.
2
Select the global icon, a group, or a SonicWall appliance.
3
Click Web Filter > Categories.

The Web Filter Report displays a pie chart with the Top Categories of blocked access and total attempts to access.

You can drill down for additional Details views on connections over time (Timeline view), Sites visited, Categories of sites, and Top initiators. A Details entry links directly to the details view of all entries.

Viewing VPN Usage Reports

VPN usage reports provide details on the services and policies used by users of virtual private networks.

1
Click the Reports tab.
2
Select a SonicWall appliance.
3
Click VPN Usage > Policies.

The VPN Usage Report displays total connections for each VPN Policy item as a pie chart and tabular grid view.

You can drill down for additional Details views on Service protocols and Top initiators.

Viewing Intrusion Reports

Intrusion Reports, based purely on IPS signatures, provide details on types of intrusions and blocked access attempts.

1
Click the Reports tab.
2
Select a SonicWall appliance.
3
Click Intrusions > Detected.

The Attacks report provides a pie chart and a list of the initiating IP addresses, hosts, and users, with number of attempts for each.

Drill down for additional Detail views of Intrusion Categories, Targets, Initiators, Ports affected, Target Countries, and Initiator Countries.

Viewing Botnet Reports

Botnet reports provide details on the botnet attempts that were blocked when attempting to access the firewall.

1
Click the Reports tab.
2
Select a SonicWall appliance.
3
Click Botnet > Initiators.

The top botnet attacks report appears. The Initiators report provides a pie chart and a list of the initiating IP addresses, countries, hosts, and events, with number of attempts for each.

Drill down for additional detailed views of Attacks, Targets, Initiators, Ports affected, Initiator Countries, and Target Countries.

Viewing Geo-IP Reports

Geo-IP reports provide details on the botnet attempts that were blocked when attempting to access the firewall.

1
Click the Reports tab.
2
Select a SonicWall appliance.
3
Click Geo-IP > Initiator Countries.

The top Geo-IP initiator report appears. The Initiators report provides a pie chart of threat initiator countries blocked and events, with number of attempts for each.

Drill down for additional detailed views of Initiator IPs, Hosts, Initiator MACs, Users, and Events.

Viewing Capture ATP Reports

The Capture Advance Threat Protection (ATP) reports provide details on whether a file is malicious or not by transmitting the file to the cloud where the SonicWall Capture ATP service analyzes the file to determine if it contains a virus or other malicious elements

* 
NOTE: A Capture ATP service license is required to use the Capture ATP features.
To view Capture ATP Reports, complete the following steps:
1
Click the Reports tab.
2
Select a SonicWall appliance.
3
Click Capture ATP > Status.

The Top threats report appears.

Drill down for additional detailed views of Attacks, Targets, Initiators, Ports affected, Initiator Countries, and Target Countries.

 

Viewing Gateway Viruses Reports

The Gateway Viruses reports provide details on the Top Viruses that were blocked when attempting to access the firewall.

1
Click the Reports tab.
2
Select a SonicWall appliance.
3
Click Gateway Viruses > Blocked.

The Top Viruses report appears.

The report provides details on the viruses blocked, the targets, initiators, and a timeline of when they attempted access.

Drilling down provides a list of virus identity, Targets, Initiators, Target Countries, and Initiator Countries.

Viewing Spyware Reports

The Spyware report gives details of the spyware that was detected and/or blocked, the targets, initiators, and a timeline of when they attempted access.

1
Click the Reports tab.
2
Select a SonicWall appliance.
3
Click Spyware > Detected.

The report provides details on the types of spyware detected and blocked, targets.

Drilling down provides a list of virus identity, Targets, Initiators, Target Countries, and Initiator Countries. Drilling down lists countries of origin, and target countries.

Viewing Attacks Report

Attack reports are legacy reports that are not signature-based or not deep-packet-inspection-based. Instead, they are based on stateful packet inspections. For instance, port-scan, IP Spoof, and so on.

The Attacks report lists attempts to gain access, target systems, initiators, and a timeline of when the attack occurred.

1
Click the Reports tab.
2
Select a SonicWall appliance.
3
Click Attacks > Attempts.

The Attacks report provides a pie chart and a list of the initiating IP addresses and hosts.

Drill down for additional Detail views of Intrusion Categories, Targets, Initiators, Ports affected, Target Countries, and Initiator Countries.

Viewing Authentication Reports

Authentication reports provide information on users attempting to access the Firewall.

1
Click the Reports tab.
2
Select a SonicWall appliance.
3
Click Authentication > User Login.

The Authentication report displays a list of authenticated users, their IP addresses, service, time they were logged in, and type of login/logout. Additional Reports are available for Administrator logins and failed login attempts.

Clicking hyperlinks provides additional filtering for the reports.

You can filter on the Service to view SMA and other appliances by drilling down to the syslog:
1
Go to the filter bar and click on the + and select Service from the pull-down menu. Click the = operator, and click on the field next to it to bring up the pull-down menu. Select SSLVPN from the pull-down list

2
Click Go to view a report for that Service.
* 
NOTE: For the Duration and Service categories to be present, the Firewall appliance firmware must be at least version 5.6.0.

Viewing Flow Activity Reports

The Flow Activity Reports offers administrators an effective and efficient interface to visually monitor their network in real time, providing effective flow charts of real-time data, customizable rules, and flexible interface settings. With the Flow Activity Reports, administrators can efficiently view and sort real-time network and bandwidth data in order to:

Identify applications and websites with high bandwidth demands
View application usage on a per-user basis
Anticipate attacks and threats encountered by the network

The GMS management interface includes the following for Flow Activity:

Real-Time Viewer

The Real-Time Viewer provides administrators an inclusive, multi-functional display with information about applications, bandwidth usage, packet rate, packet size, connection rate, connection count, and multi-core monitoring.

Using the Toolbar

The Real-Time Viewer Toolbar contains features to specify the refresh rate, export details, configure color palettes, change the amount of data displayed, and pause or play the data flow. Changes made to the toolbar apply across all the data flows.

Real-Time Viewer toolbar options

Option

Widget

Description

Refresh rate

Determines the frequency at which data is refreshed. A numerical integer between 1 to 10 seconds is required. One second is the default.

Export

Exports the data flow into a comma separated variable (.csv) file. The default file name is sonicflow.csv.

Configure

Allows for customization of the color palette for the Application Chart and Bandwidth Chart.

To customize the Color Palette:

Enter the desired hexadecimal color codes in the provided text fields.

Select Default for a default range of colors.

Select Generate to generate a random range of colors.

If a gradient is desired, select the Use Gradient box located below the text fields.

View Range

Displays data pertaining to a specific span of time. Two minutes is the default setting for the view range.

Time & Date

Displays the current time in 24-hour format (hh:mm:ss), and the current date in Month/Day format.

Pause

Freezes the data flow. The time and date also freezes.

The Pause button appears gray if the data flow has been frozen.

Play

Unfreezes the data flow. The time and date refreshes as soon as the data flow is updated.

The Play button appears gray if the data flow is live.

Applications Monitor

The Applications data flow provides a visual representation of the current applications accessing the network.

Options are available to Display, Scale, and View the Application interface.

 

Applications data

Option

Widget

Description

Application Display

Specifies the applications displayed in the Application Flow Chart.

A drop menu allows the administrator to specify Most Frequent Apps, All Apps, or individual applications. If desired, multiple applications can be selected by clicking more than one check box.

Scale

Allows for Auto Y-Scaling or customized scaling of the Application Flow Chart.

The values for customized scaling must be a numeric integer. Specifying a unit is optional. If a unit is desired, these are the available options:

K for Kilo.

M for Mega.

G for Giga.

% for percentage.

If a custom scale of 100Kbps is desired, then “100K” should be entered. The numeric integer 100 is entered followed by the unit K.

Bar Graph

Displays the Applications data in a bar graph format.

Flow Chart

Displays the Applications data in a flow chart format.

Available Formats

Administrators are able to view the Application flow charts in a bar graph format or flow chart format. The bar graph format displays applications individually, allowing administrators to compare applications. In this graph, the x-axis displays the name of the applications. The y-axis displays the amount of traffic for each application. The following example is a “Flow Chart” view.

The flow chart format displays stacked application data. In this graph, the x-axis displays the current time and the y-axis displays the traffic for each application. The following example is a “Bar Chart” view.

Ingress and Egress Bandwidth Flow

The Ingress and Egress Bandwidth data flow provides a visual representation of incoming and outgoing bandwidth traffic. The current percentage of total bandwidth used, average flow of bandwidth traffic, and the minimum and maximum amount of traffic that has gone through each interface is available in the display. Administrators are able to view the Ingress and Egress Bandwidth flow chart in a bar graph format or flow chart format.

The bar graph format displays data pertaining to individual interfaces in a bar graph; allowing administrators to compare individual Bandwidth Interfaces. In this graph, the x-axis denotes the Interfaces whereas the y-axis denotes the Ingress and Egress Bandwidth traffic.

The flow chart format overlaps the Bandwidth Interfaces; allowing administrators to view all of the Ingress and Egress Bandwidth traffic as it occurs. The x-axis displays the current time and the y-axis displays the Ingress and Egress Bandwidth traffic.

Options are available to customize the Display, Scale, and View of the Ingress and Egress Bandwidth interface.

 

Customization options

Option

Widget

Description

Interface Rate Display

Specifies which Interfaces are displayed in the Bandwidth Flow Chart.

A drop menu provides the administrator with options to specify All Interfaces Rate, All Interfaces, and individual interfaces.

The individual interfaces vary depending on the number of interfaces on the administrator’s network. Multiple interfaces can be selected if desired.

Scale

Allows for Auto Y-Scaling or custom scaling of the Bandwidth Flow Chart.

The values for customized scaling must be a numeric integer. Specifying a unit is optional. If a unit is desired, four options are available:

K for Kilo.

M for Mega.

G for Giga.

% for percentage.

If a custom scale of 100Kbps is desired, then “100K” should be entered. The numeric integer 100 is entered followed by the unit K.

Bar Graph Format

Displays the real-time Bandwidth data in a bar graph format.

Flow Chart Format

Displays the real-time Bandwidth data in a flow chart format.

Tooltips

Rolling over the interfaces provides tooltips with information about the interface assigned zone, IP address, and current port status.

* 
NOTE: The Bandwidth flow charts have no direct correlation to the Application flow charts.
Packet Rate Monitor

The Packet Rate Monitor provides the administrator with information on the ingress and egress packet rate in packet per second (pps). This can be configured to show packet rate by network interface. The graph shows the packet rate current average, minimum packet rate, and maximum packet rate for both ingress and egress network traffic.

Packet Size Monitor

The Packet Size Monitor provides the administrator with information on the ingress and egress packet rate in bytes (B). This can be configured to show packet size by network interface. The graph shows the packet size current average, minimum packet size, and maximum packet size for both ingress and egress network traffic.

Connection Count Monitor

The Connection Count data flow provides the administrator a visual representation of “current” total number of connections, “peak” number of connections, and maximum. In this example, the y-axis displays the total number of connections from 0C (zero connections) to 1KC (one kilo connections).

Multi-Core Monitor Flow

The Multi-Core Monitor displays dynamically updated statistics on utilization of the individual cores of the SonicWall SuperMassive. Core 1 through core 8 handles the control plane. Core 1 through core 8 usage is displayed in green on the Multi-Core Monitor. The remaining cores handle the data plane. To maximize processor flexibility, functions are not dedicated to specific cores; instead all cores can process all data plane tasks. Memory is shared across all cores. Each core can process a separate flow simultaneously, allowing for up to 88 flows to be processed in parallel.

Administrators are able to view the Multi-Core Monitor flow chart in a bar graph format or flow chart format. The bar graph format displays data pertaining to individual cores. In this graph the x-axis displays the cores where the y-axis displays the percentage of CPU used.

The flow chart format overlaps the Multi-Core Monitor data. The x-axis displays the current time and the y-axis displays the percentage of CPU used.

Scale, and View are options available to customize the Multi-Core Monitor interface.

 

Customization options

Option

Widget

Description

Aggregate Display

Specifies which Cores are displayed in the Multi-Core Monitor Flow Chart.

A drop menu allowing the administrator to specify Current (Aggregate), Average (Aggregate), and individual Cores.

The individual Cores vary depending on the number of Cores available. Multiple Cores can be selected if desired.

Scale

Allows for Auto Y-Scaling or customized scaling of the Multi-Core Monitor Flow Chart.

The values for customized scaling must be a numeric integer. Specifying a unit is optional. If a unit is desired, the four available options include:

K for Kilo.

M for Mega.

G for Giga.

% for percentage.

If a custom scale of 100 percent is desired, then “100%” should be entered. The numeric integer 100 is entered followed by the unit K.

Bar Graph Format

Displays the Multi-Core Monitor data in a bar graph format.

Flow Chart Format

Displays the Multi-Core Monitor data in a flow chart format.

Reports_FlowActivity_TopFlowsDashboard_Snwls

Top Flows Dashboard

The Top Flows Dashboard page displays the top flows for the following:

Top Applications
Top Users
Top Viruses
Top Intrusions
Top Spyware
Top URL Ratings
Top Locations
Top IP Address
Top Flows Dashboard Action Items

The Top Flows Dashboard Toolbar allows for customization of the Top Flows interface. The ability to select the duration of time and start/end date for more application and user control.

This table details the action items of the Top Flows Dashboard.

 

Action items

Option

Widget

Description

Last

Selects time range for the top flow reports. You can also create a custom range.

Start

Selects the starting date and time for the top flow reports.

End

Selects the end date and time for the top flow reports.

Refresh

Refreshes the real-time data.

View by

Selects the report view.

Flow Analytics

The Flow Analytics page provides administrators with real-time, incoming and outgoing network data. Various views and customizable options in the Flow Analytics Interface assist in visualizing the traffic data by applications, users, URLs, initiators, responders, threats, VoIP, VPN, devices, or by contents.

Filter Options

The Flow Analytics Filter Options allows the administrator to filter out incoming, real-time data. Administrators can apply, create, and delete custom filters to customize the information they wish to view. The Filter Options apply across all the Application Flow tabs. Refer to Using Filtering Options.

 

Filter options

Option

Widget

Description

Add to Filter

Adds current selection to filter.

At least 1 item must be selected in order to use the Filter Options. After doing so, all other tabs update with information pertaining to the items in the filter.

Remove from Filter

Removes the current selection from the filter view by clicking on the X.

Save

Saves the current filter settings.

Delete

Deletes the current filter settings.

Flow Analytics Tabs

The Flow Analytics Tabs contains details about incoming and outgoing network traffic. Each tab provides a faceted view of the network flow. The data is organized by Applications, Users, URLs, Initiators, Responders, Threats, VoIP, VPN, Devices, and Content.

The Applications tab displays a list of Applications currently accessing the network.
The Users tab displays a list of Users currently connected to the network.
The URLs tab displays a list of URLs currently accessed by Users.
The Initiators tab displays details about current connection initiators.
The Responders tab displays details about current connection responders.
The Threats tab displays a list of threats encountered by the network.
The VoIP tab displays current VoIP and media traffic.
The VPN tab displays a list of VPN sessions connected to the network.
The Devices tab displays a list of devices currently connected to the network.
The Contents tab displays information about the type of traffic flowing through the network.
Flow Analytics Toolbar

The AppFlow Toolbar allows for customization of the Flow Analytics interface. The ability to create rules and add items to filters allows for more application and user control. Different views, pause and play abilities, customizable data intervals and refresh rates are also available to aid in visualizing incoming, real-time data.

 

Customization options

Option

Widget

Description

Filter View

Adds selected items to the filter.

Interval

The span of time in which data is collected.

Group

Categorizes selections according to the available grouping options which vary depending on the tab that is selected.

List View

Provides a detailed list view of the data flow.

Pie Chart View

Provides a pie chart view of the data flow.

Flow Chart View

Provides a flow chart view of the data flow.

Export

Exports the data flow in comma separated variable (.csv) format.

Print PDF Report

Generate an Application Visualization Report.

Configuration

Allows for customization of the display by enabling or disabling columns for Applications, Sessions, Packets, Bytes, Rate, and Threats. Also allows the administrator to enable or disable commas in numeric fields.

Refresh

Refreshes the real-time data.

Group Options

The Group option sorts data based on the specified group. Each tab contains different grouping options.

The Applications tab can be grouped by:
Application: Displays all traffic generated by individual applications.
Category: Groups all traffic generated by an application category.
The Users tab can be grouped by:
User Name: Groups all traffic generated by a specific user.
IP Address: Groups all traffic generated by a specific IP address.
Domain Name: Groups all traffic generated by a specific domain name.
Auth Type: Groups all traffic generated by a specific authorizing method.
The URL tab can be grouped according to:
URL: Displays all traffic generated by each URL.
Domain Name: Groups all traffic generated by a domain name.
Rating: Groups all traffic generated based on CFS rating.
The Initiators tab can be grouped according to:
IP Address: Groups all traffic generated by a specific IP address.
Interface: Groups all traffic according to the firewall interface.
Country: Groups all traffic generated by each country, based on country IP database.
Domain Name: Groups all traffic generated by a domain name.
The Responders tab can be grouped according to:
IP Address: Groups all traffic by IP address.
Interface: Groups responders by interface.
Country: Groups responders by each country, based on country IP database.
Domain Name: Groups responders by domain name.
The Threats tab can be grouped according to:
Intrusions: Displays flows in which intrusions have been identified.
Viruses: Displays flows in which viruses have been identified.
Spyware: Displays flows in which spyware has been identified.
Spam: Displays all flows that fall under the category of spam.
All: Displays all threats of any type.
The VoIP tab can be grouped according to:
Media Type: Groups VoIP flows according to media type.
Caller ID: Groups VoIP flows according to caller ID.
The VPN tab can be grouped according to:
Remote IP Address: Groups VPN flows access according to the remote IP address.
Local IP Address: Groups VPN flows access according to the local IP address.
Name: Groups VPN flows access according to the tunnel name.
The Devices tab can be grouped according to:
IP Address: Groups flows by IP addresses inside the network.
Interface: Groups flows by interfaces on the firewall.
Name: Groups flows by device name, or MAC address.
The Contents tab can be grouped according to:
Email Address: Groups contents by email address.
File Name: Groups flows by file type detected.
Flow Analytics Views

Three views are available for the Flow Analytics: Detailed List View, Pie Chart and Flow Chart Graph View. Each view provides the administrator a unique display of incoming, real-time data.

List View

In the List View, each tab is comprised of columns displaying real-time data. These columns are organized into sortable categories.

Check Box: Allows the administrator to select the line item for creation of filters.
Main Column: The title of the Main Column is dependent on the selected tab. For example, if the Users Tab is the selected, then the Main Column header reads “Users.” In that column, the name of the Users connected to the network are shown. Clicking on the items in this column brings up a popup with relevant information on the item displayed.
Sessions: Clicking on this number brings up a table of all active sessions.
Packets: Displays the number of data packets transferred.
Bytes: Displays the number of bytes transferred.
Rate (KBps): Displays the rate at which data is transferred.
Threats: Displays the number of threats encountered by the network.
Total: Displays the total Sessions, Packets, and Bytes sent during the duration of the current interval.

Application Details

Each item listed in the Main Column provides a link to an Application Detail dialog. A display appears when the item links are clicked. The dialog provides:

Description of the item
Information pertaining to the category, threat level, type of technology the item falls under, and other additional information
Application details are particularly useful when an Administrator does not recognize the name of an Application.

Graph View

The Graph View displays the top applications and the percentage of bandwidth used. The percentage of bandwidth used is determined by taking the total amount of bandwidth used by the top applications, and dividing that total by the amount of top applications.

Using Filtering Options

Using filtering options allow administrators to reduce the amount of data seen in the Flow Analytics. By doing so, administrators can focus on points of interest without distraction from other applications.

To use the Filtering Options, complete the following steps:
1
Navigate to Flow Activity > Flow Analytics > Applications. Select the check boxes of the applications you wish to add to the filter. In this case, Ventrilo is selected.
2
Click Filter View to add Ventrilo to the filter.
3
After the application is added to the filter, only Ventrilo is visible in the Applications tab.

More information about Users, peer connectivity, and packets sent are visible in the Flow Analytics tabs. The Users using Ventrilo are visible in the Users tab. The IP Addresses of these users are visible in the Initiators tab. The IP Addresses of the connected peers who are sharing packets are visible in the Responders Tab.

Flow Reports

The Flow Reports page provides administrators with configurable scheduled reports by applications, viruses, intrusions, spyware, and IP. Flow Reports statistics enable network administrators to view a top-level aggregate report of what is going on in your network.

Flow Reports Tabs

The Flow Reports Tabs contains details about incoming and outgoing network traffic. Each tab provides a faceted view of the network flow.

The Applications tab displays a list of Applications currently accessing the network.
The Users tab displays a list of Users currently connected to the network.
The IP tab displays a list of the IP addresses currently accessing the network.
The Viruses tab displays a list of detected viruses on the network.
The Intrusions tab displays a list of the attempted intrusions over the selected time period.
The Spyware tab displays a list of detected spyware on the network.
The Location tab displays a list of locations that users are accessing the network from.
The URL Rating tab displays a list of rated URLs on the network.
Flow Reports Toolbar

The Flow Reports Toolbar allows for customization of the Flow Reports interface. The ability to create rules and add items to filters allows for more application and user control. Different views, pause and play abilities, customizable data intervals and refresh rates are also available to aid in visualizing incoming, real-time data.

 

Customization options

Option

Widget

Description

Export

Exports the data flow in comma separated variable (.csv) format.

Print PDF Report

Generate an Application Visualization Report.

Refresh

Refreshes the real-time data.

Federated Management & Reporting

The Federated Management & Reporting feature allows the user to configure policies directly from the Reports panel. This is context sensitive and available to all reports in the Security Services category.

This feature is supported on the following reports:

Unit Level > Intrusions > Detected and Blocked – Report Column “Intrusion”
Unit Level > Spyware > Detected and Blocked – Report Column “Spyware”
Unit Level > Gateway Viruses > Blocked – Report Column “Virus”
Unit Level > Applications

There are two types of policy screens that display when using this feature:

A pop-up configuration window for a specific policy displays when a Signature ID is available.
A policy screen with a list of policies displays when a Signature Name is available. From this screen, you can select a specific policy to edit.

The following are configuration examples for each type of policy screen:

Pop-up Configuration Window
1
Navigate to a report.
2
Right-click on a column, then select Configure Policy.

3
The Policy Configuration window displays. Configure the Policy settings, then click Update.

Policy Screen
1
Navigate to a report.
2
Right-click on a column, then select Configure Policy.

The Policy screen displays a list of policies for the selected report.

3
Click Edit for the policy you want to edit.
* 
NOTE: You can also add or delete polices from this screen.

The pop-up configuration window displays.

4
Configure the policy settings, then click OK.

Using the Log Analyzer

The Log Analyzer allows advanced users to examine raw data for status and troubleshooting. The Analyzer logs contain detailed information from the system logs on each transaction that occurred on the specified SonicWall appliance. These logs can be filtered or drilled down to further narrow the focus of the information, allowing analysis of data about alerts, interfaces, bandwidth consumption, and so on. The Log Analyzer is only available at the individual unit level.

Log information can be saved for later analysis and reloaded from Custom Reports.

To load a report for viewing, either:

Click Load Custom Report and select from the pull-down list of saved Custom Reports.
Click on Analyzers > Log Analyzer to view the current log.
* 
NOTE: The Log Analyzer entries display raw log information for every connection. Depending on the amount of traffic, this can quickly consume a large amount of space in the database. It is highly recommended to be careful when choosing the number of days of information to be stored.

Viewing the Log Analyzer

The log displays information specific to either a particular report or overall system information, depending on the path used to reach the log, either from the individual report level or from the Log Analyzer entry on the Reports tab. Entries in the Analyzer log vary, according to the relevant report type. You can customize the log entries by using the following options:

Show/Hide Log Columns

Use the Show/Hide Columns function to hide columns that you do not want to display in the Analyzer Log. Just click the Configure the Log Analyzer icon, then select the columns that you want to display and deselect the ones that you do not want to display. By configuring the displayed columns, the Log Analyzer gives a more clean, concise, and meaningful way to view the logs, instead of displaying unnecessary columns that take up valuable real estate.

* 
NOTE: “Serial number” column and “Time” column are not part of the list to be configured because they are necessary for any displays.
Row-Based Expansion

Instead of showing all the column information at the same time, the row-based expansion simplifies the screen and gives on-demand information through a single click.

Click on each row to pull down the hidden column information.

* 
NOTE: This feature is only available after you sort the columns using the show/hide function.
Full Screen Mode

Switch to full screen mode by clicking the Full Screen Mode toggle icon. This populates the entire browser screen with the Log Analyzer page, hiding the tree control and Reports panels.

Session-Based Configurations

All column configurations for the Log Analyzer are recorded in each session. This is so that within the session, users can have the desired/configured tabular view of the Log Analyzer at all times.

Priority

The log event messages are color-keyed according to priority. Red is the highest priority, followed by yellow for Alerts. Messages without color keys are informational, only. The color categories are:

Alert: Yellow
Critical: Red
Debug: White
Emergency: Red
Error: White
Info: White
Notice: White
Warning: White

Color keys allow you to immediately focus on the priority level of the message, and filter data accordingly.

Filtering the Analyzer Log

The Log Analyzer allows you to add filters to view user-or incident-specific data. The Log analyzer can be reached either by drilling down in individual reports, or from the Analyzers item under the Reports tab.

To view the Analyzer Log, complete the following steps:
1
Click the Reports tab.
2
Select a SonicWall appliance from the TreeControl pane.
3
Click to expand the Analyzer tree and click on Log Analyzer. The saved Log Analyzer report page displays.

* 
NOTE: Because system logs have a large number of entries, it is advisable to constrain the number of entries displayed on the page. Saved system logs are limited in the number of rows that are saved. If saving to PDF, a maximum of 2500 rows are saved. If saving to Excel, a maximum of 10,000 rows are saved.
4
To add a filter, click on the + in the Filter Bar and specify the desired filter item and parameters.

Available filters include filters for Application, Category, DST Interface, DST Port, Duration, Initiator Country, Host, or IP address, Interface, Message, Priority, Responder country, IP, or Name, Service, Session, Src Interface, Src Port, URL, User, or VPN Policy. This full list is available from the Log Analyzer Entry.

If you are viewing the log in the Log Analyzer view for a specific application entry, only those filters specific to that entry are available.

Log views are drillable, and will add filters as column entries are drilled. Click on an entry of interest to add a filter and further constrain the information displayed.

Log Analyzer Packet Data

The Log Analyzer allows you to filter through packet data.

To view the Analyzer Log Packet Data, complete the following steps:
1
Click the Reports tab.
2
Select a SonicWall appliance from the TreeControl pane.
3
Click to expand the Analyzer tree and click on Log Analyzer. The saved Log Analyzer report page displays.
4
Add the Packets filter by clicking the + in the Filter Bar and selecting the Packets filter item, IS and EXISTS parameters.
5
Click the button in the second column of each row.

A window pops up to reveal available packet data content as shown in the following figure.

6
Click Copy to Clipboard at bottom of the packet content display window to copy the Packet Data contents to the clipboard.

Log Analyzer Use Case

In the following use case, we will sort and filter the captured event information to evaluate threats targeted toward the X0 default interface.

On the Reports tab, click on Analyzers > Log Analyzers.

1
In the Log Analyzer, click on the + to add a filter, and select the Interface filter.
2
Type in X1 to specify the default interface filter.
3
Click Go.

The Log Analyzer is filtered on the X1 port interface.

This allows you to begin debugging, or further investigate use of the database.

More information can also be found by using Universal Scheduled Reports.

Viewing Status Uptime/DownTime Summary Reports

The Status Up-Time Summary report contains information on the status of a SonicWall appliance or group of appliances during each hour of the specified day.

To view the Status Up-Time Summary report, complete the following steps:
1
Click the Reports tab.
2
Select the global icon, a group, or a SonicWall appliance.
3
Expand the Status tree and click Up-Time Summary. The Up-Time Summary page displays.

The bar graph displays the amount of time the SonicWall appliance(s) were online and functional during each hour of the day.

The Report contains the following information:

Hour—when the sample was taken.
Up Time—number of minutes during the hour that the SonicWall appliance was “Up.”
Down Time—number of minutes during the hour that the SonicWall appliance was “Down.”
Up Time %—percentage of time the SonicWall appliance was “Up” over the hour.

4
By default, the GMS Reporting Module shows yesterday’s report. To change the date of the report and other settings, click the date field to access the pull-down calendar, or click the backward arrow to page further back in time, on a day-by-day basis.

Configuration Settings

Configuration settings allow you to set up certain parameters for how data is displayed in Reports. You can set up currency cost per Megabyte for the Summarizer, or add filters for the Log Analyzer reports.

Setting Up Currency Cost for Summarizer

The Data Usage page contains a Cost per connection entry. You can set what currency and the cost per Megabyte.

1
Click Configuration > Settings on the Reports tab.

2
Select the currency of the desired country and the cost per MB.
3
Click Update. The cost is immediately reflected on the Data Usage page.

Adding Syslog Exclusion Filters

Exclusion Filters restrict what information is used to generate Reports. This is achieved by filtering out syslogs (based on the criteria specified in the Syslog Filter screen) from being uploaded to the Reports database. These filtered syslogs are, however, stored in the file system and archived, thus ensuring that all syslogs are available for audit trailing purposes. Excluding data from being uploaded to the Reporting database in this way can be useful in maintaining confidentiality regarding use history, or eliminating data corresponding to certain users who are not of interest. For instance, you might use an Exclusion Filter to eliminate data from the company CEO. This screen is used to specify syslog filters for the unit selected in the TreeControl. A similar screen exists for system wide syslog filtering, in the Console tab’s Reports > Syslog Filter screen.

1
To add an Exclusion filter, click on Configuration > Filters.

The Syslog Exclusion Filter page comes up. This page allows you to view what filters are currently applied, add filters, or remove filters.

2
To configure and add an Exclusion Filter, click Add Filter. The Add Filter menu comes up.

3
Specify the field you want to modify, and select an operator and value.
4
Add a comment to help identify the filter.
5
Click Update.

The Reports are now filtered according to the selected criteria. Exclusion Filter settings are picked up by the Summarizer at specified regular intervals.

Alerts

The Events entry on the Reports tab allows you to configure and view alerts specific to Reporting for the unit selected.” The Events entry on the Reports tab allows you to configure and view alerts specific to Reporting for the unit selected, through the Alert Settings and Current Alerts items.

You can follow specific alerts. For more information, refer to Using Granular Event Management.

1
Click on Events > Alert Settings.

The Alerts menu comes up. You can use this menu to search for Alerts by name or type, either by exact match or matching strings. Click Search to find an Alert of interest.

2
You can also add an alert. Click Add Alert on the Alerts menu. The resulting pop-up menu allows you to specify the type of data you want to track, how often to poll for data, and whether it is visible to only administrators or to non-administrators as well.

Alert Types are pre-defined, static parameters and are not customizable. Available categories are:

 

Available categories

Alert Type

Description

Bandwidth usage (Billing Cycle)

Tracks the bandwidth total in bytes per billing cycle. The value that the threshold uses is Numeric.

Bandwidth Usage (Daily)

Tracks the daily bandwidth total in bytes. The value that the threshold uses is Numeric.

Events/Hits (Daily)

Tracks the daily events/hits total. The value that the threshold uses is Numeric.

Number of Threats (Daily)

Tracks the daily attacks count. The value that the threshold uses is Numeric.

3
Select the Alert Type and click on Edit Content to edit threshold values. A popup menu comes up. You can choose from the preset Threshold values or create a new threshold value by clicking the icon to the right of the Threshold banner. Only one new threshold can be created at a time. For more information on thresholds, see Configuring Event Thresholds.
* 
NOTE: Threshold values might not be available for all Alert types. If this is the case, the Edit Content field is not present.
4
Alerts can be emailed to you or a specified destination on a regular schedule. You can specify up to five destinations. Click Add Destination to enable and select from the pull-downs of destination and schedule entries.

5
Click Add Destination again to add up to five destinations and associated schedules.

For more information on configuring Destinations, refer to Destination / Schedule.

6
Click Update when you have finished configuring the Alert. It is added to the list of Alerts on the menu.

You can view any currently-configured alerts by clicking Alerts > Current Alerts. A display of the current Alerts comes up.

The listing shows the severity level of the Alert, the unit to which it applies, and a description. Additional details can be obtained by hovering over the balloon on the right side of the column.

Custom Reports

You can configure a report with customized filters, then save it for later viewing and analysis. Saving a Report allows you to view it later, by loading it through the Custom Reports interface. Custom Reports can either be saved directly, or configured through Universal Scheduled Reports. You can either load the report through the Custom Report pull-down on the Search Bar, or click Reports > Custom and choose from the list of saved Custom reports.

Regularly scheduled Custom Reports can be configured through the Universal Scheduled Reports interface, accessible through the Custom Reports icon in the upper right corner. These reports can be set up to be emailed to you on a regular schedule.

Custom Reports are available at the unit level for all appliances visible on the Firewall tab. The Log Analyzer must be enabled for the appliance.

The Manage Reports screen (Custom Reports > Manage Reports) allows you to view what Custom Reports are available and delete reports from the system.

For more information on configuring and scheduling custom Reports refer to the Universal Scheduled Reports section.

Managing SMA Reports

This describes how to view SonicWall™ Global Management System (GMS) Secure Mobile Access (SMA) Reports. SMA reporting includes reports for the Web Access Firewall (WAF) and summarization for SMA appliances using Secure Mobile Access.

This contains the following:

SMA Reporting Overview

This section provides an introduction to the Secure Mobile Access (SMA) reporting feature. SonicWall SMA appliances are protected by the user portal on the Web Application Firewall (WAF). This section contains the following subsections:

After reading the GMS SMA Reporting Overview section, you will understand the main steps to be taken in order to create and customize reports successfully.

For a general introduction to reporting, see GMS Reporting Overview.

SMA Reports Tab

The SMA tab gives you access to the Secure Mobile Access (SMA) Reports section of the GMS management interface. Reporting supports both graph and non-graph reports, and allows you to filter data according to what you wish to view.

What is SMA Reporting?

Secure Mobile Access (SMA) reporting allows you to configure and design the way you view your reports and the manner in which you receive them. This feature offers various types of static and dynamic reporting in which you can customize the way information is reported.

SonicWall GMS SMA reporting provides a visual presentation of User connectivity activity, Up_Down status, and other reports related to remote access. With SMA reporting, you are able to view your reports in enhanced graphs, create granular, custom reports, create scheduled reports, and search for reports using the search bar tool.

Custom reports are also available in SMA reporting. SonicWall appliances managed with SMA provide Resource Activity reports for tracking the source, destination, and other information about resource activity passing through a SonicWall SMA device that can then be saved as a Custom report, for later viewing.

Custom Reports can be created through an intuitive, responsive interface for customizing the report layout and configuring content filtering prior to generating the report. Two types of reports are available: Detailed Reports and Summary Reports. Both provide detailed information, but are formatted to meet different needs. A Detailed Report displays the data in sortable, resizable columns, while a Summary Report provides top level information in graphs that you can click to drill down for detailed information. By customizing the report, you can then save it for later viewing and analysis.

After you set up a Custom Report that meets your needs, you can save the report for later viewing, then manage it through the Custom Reports Manage Reports entry, or export the report as a PDF or CSV (Excel) file.

Benefits of SMA Reporting

SMA reports provide visibility into the resource use by logged in users, leading to policies that enhance the user experience and the productivity of employees. The following capabilities contribute to the benefits of the SMA reporting feature:

SMA Detail Level Reports can track events to the minute or second of the day for forensics and troubleshooting
Interactive charts allow drill-down into specific details
Table structure with ability to adjust column width of data grid
Improved report navigation
Report search
Scheduled reports

How Does SMA Reporting Work?

Syslog information for SonicWall remote appliances is sent to the GMS syslog collector and uploaded to the Reports Database by the summarizer. The frequency of upload is nearly real-time: data is uploaded to the Reports database as soon as the Syslog Collector closes the file. The file is closed and ready for upload as soon as it reaches 10,000 MB per file or if the file has been open for three minutes, whichever comes first.

This database is saved using a date/time suffix, and contains tables full of data for each appliance. All the syslog data received by SonicWall GMS is available in the database.

SMA Reporting supports scheduled reports to be sent on a daily, weekly, or monthly basis to any specified email address.

Using and Configuring SMA Reporting

This section describes how to use and configure SMA reporting. See the following subsections:

Viewing Available SMA Report Types

To view the available types of reports for SMA Web Application Firewalls (WAF), complete the following steps:
1
Log into your GMS management console.
2
Click the SMA tab.
3
Click the Reports tab on the top of the screen. The following types of reports are available:
For E-Class SMA series appliances

Group Level Reports:

Data Usage
Summary: connections per SMA appliance
WAF
Summary: connections listed by appliance for one day (default)
Connections
Summary: offloaded connections listed by appliance for one day (default)

Unit Level Reports:

Clicking on hyperlinks in the Unit Level Reports takes you to the Analyzer Log where you can view more information.

Data Usage
Timeline: total connections listed by hour
Users: connections listed by user
User Activity
Details: a detailed report of activity for the specified user
Access Method
Summary: connections per connection protocol (HTTPS, NetExtender, and so on.)
Users: top users by protocol
Authentication
User login: authenticated user logins by time and IP protocol. User Login reports combine admin users with all other users in the same report.
Failed login: Failed login attempts with initiator IP address.
Up/Down
Timeline: uptime and downtime by hour for one day
Custom Reports
Manage Reports: manage custom reports
Analyzers
Log Analyzer: logs of all activity
Configuration: menus allow setting Report display options
Syslog Filter: applies filters to the system logs uploaded to the reporting database
Events: these menus allow setting options
Alert Settings: provides search functions, adding or removing Alerts
Current Alerts: displays current applicable Alerts.Custom
For SMA series appliances:

Group Level Reports:

Data Usage
Summary: connections per SMA appliance
WAF
Summary: connections listed by appliance for one day (default)
Connections
Summary: offloaded connections listed by appliance for one day (default)

Unit Level Reports:

Clicking on hyperlinks in the Unit Level Reports takes you to the Analyzer Log where you can view more information.

Data Usage
Timeline: total connections listed by hour
Users: connections listed by user
User Activity
Details: a detailed report of activity for the specified user
Access Method
Summary: connections per connection protocol (HTTPS, NetExtender, and so on.)
Users: top users by protocol
Authentication
User login: authenticated user logins by time and IP protocol. User Login reports combine admin users with all other users in the same report.
Failed login: Failed login attempts with initiator IP address.
WAF
Timeline: total threats detected per appliance
Threats Detected: top threats detected per day
Threats Prevented: top threats prevented per day
Apps Detected: top applications detected per day
Apps Prevented: top applications blocked per day
Users Detected: number of concurrent users per day
Users Prevented: number of blocked users prevented per day
Connections
Timeline: a summary of offloaded connections under the group node per SMA appliance, listed for one day.
Applications: offloaded connections by application
Users: offloaded connections by user
Up/Down
Timeline: uptime and downtime by hour for one day
Custom Reports
Manage Report: manage your custom reports
Analyzers
Log Analyzer: logs of all activity
Configuration: menus allow setting Report display options
Log Analyzer Filter: applies filters to the system logs uploaded to the reporting database
Events: these menus allow setting options
Alert Settings: provides search functions, adding or removing Alerts
Current Alerts: displays current applicable Alerts.Custom
* 
NOTE: You can use the Date Selector to select reports covering other intervals than those listed here.

Configuring SMA Scheduled Reports

SMA reports are scheduled through the Universal Scheduled Reports interface. Additionally, you can configure alerts and filter the syslog.

To configure SMA scheduled reports and summarization, click on the Schedule Report icon. The Universal Schedule Report menu comes up. For more information on scheduling and configuring reports, refer to the section on Universal Scheduled Reports.

Navigating Through Detailed SMA Reports

SMA reports display either summary or unit views, displayed in a Data Container. Information can be viewed in either chart (timeline or pie chart) form, or tabular (grid) format. The list of available reports allows you to navigate to a high-level or specific view. Data can be filtered by time constraints or data filters.

Drillable reports give access to additional information by clicking on hyperlinks to go to the Detail view. For some reports, you can go directly to the detail views by clicking Details in the Policies/Reports pane.

Data filtering can be applied either by using the Filter Bar, drilling down through hyperlinked data, or applying a filter to a drillable data column.

Viewing SMA Summary Reports

The SMA group level Summary report displays all SMA interfaces under that group level node, along with the total number of threats detected on the specified day.

The SMA Summary report is available for Data Usage, Web Application Firewall (WAF), and Connections. It shows the number of connections handled by the SMA appliances on the specified day or interval. The grid-level reports lists each appliance by name, along with the number of connections.

To view the Data Usage Summary report, complete the following steps:
1
Click the Reports tab.
2
Select the global icon or a group in the TreeControl menu.
3
Expand the Data Usage, WAF, or Connections tree and click Summary. The Summary page displays.

For more information, click on an individual appliance in the TreeControl menu. More settings, as well as more detailed information, is available at the Unit View level.

Viewing SMA Unit-Level Reports

Unit View reports provide detail about Data Usage, Access Method, Authentication, WAF Access, Connections, Uptime, and Downtime. You can also view the results from the Analyzers or saved Custom Reports.

Topics:

Viewing Unit-Level Data Usage Reports

1
Click the Reports tab.
2
Select the desired Unit in the TreeControl menu.
3
Expand the Data Usage entry and click Timeline to display the Report.
4
The graph displays the number of connections to the selected SMA appliance during the desired interval. The current 24 hours is displayed by default.

The timeline contains the following information:

Hour—when the sample was taken.
Connections—number of connections to the SMA appliance
5
To change the interval of the report, use the left arrow to click back a day at a time, or click on the Time Bar to access the Interval menu pull-down calendar.
6
After selecting a date, click Search. The GMS Reporting Module displays the report for the selected day.
* 
NOTE: The date setting stays in effect for all similar reports during your active login session.

Viewing SMA Top Users Reports

The Top Users report displays the users who used the most connections on the specified date.

To view the Top Users report, complete the following steps:
1
Click the Reports tab.
2
Select the SMA appliance.
3
Expand the Data Usage tree and click Users. The Top Users page displays.

4
The pie chart displays the percentage of connections used by each user.

The table contains the following information for all users:

Users—the user name
Connections—number of connection events or “hits”

By default, the GMS Reporting Module shows yesterday’s report, a pie chart for the top six users, and a table for all users. To change the date of the report, click the Start field to access the pull-down calendar.

5
To display a limited number of users, use the Search Bar fields.
* 
NOTE: This report allows you to drill down by user. Clicking on a user in either the chart or grid view takes you to the Log Analyzer.

Viewing User Activity Logs

Web User Activity logs allow you to filter results to view only the activity of a specific user.

The User Activity Analyzer provides a detailed report listing activity filtered by user. If a user report has been saved previously, bringing up the User Activity Analyzer displays a list of saved reports under the Filter Bar.

If you wish to create a new report, use the Filter Bar to create a new report.

1
Click the Reports tab.
2
Select a SonicWall appliance.
3
Click on User Activity > Details to bring up the User Activity Analyzer. The User Activity Analyzer generates a Detail report based on the user name.

If no user activity reports were saved, only the Filter Bar displays, with the User filter pre-selected. You can enter a specific user name, or use the LIKE operator wildcards (*) to match multiple names.

4
Enter the name of the user into the field and click Go (arrow) to generate the report

The customized User Activity Details report displays a timeline of events, Initiators, Responders, Services, Applications, Sites visited, Blocked site access attempted, VPN access policy in use, user authentication, Intrusions, Initiator Countries, and Responder Countries associated with that particular user.

Data for a particular user might not be available for all of these categories.

Viewing Access Method Reports

Access Methods provide an overview of the protocols used to access the net. They are available as a summary pie chart or in a Top User report, both of which provide additional information on the access protocol of the specified user through the Log Analyzer.

Viewing the Access Summary Report

The Access Summary report provides an overview of the types of access protocols used. Clicking on a hyperlinked protocol entry takes you to the Log Analyzer view for more details.

To view the Summary Report:

1
Click the Reports tab.
2
Select a SMA appliance.
3
Expand the Access Method tree and click Summary. The Access Method Summary page appears.

4
Click on a section of the pie chart to obtain more details, or hover the mouse over an item on the Protocol column and right click Add Filter to narrow the results to a particular access protocol. The result displays in the Log Analyzer report.

Viewing the Top Users Access Report

1
Click the Reports tab.
2
Select a SMA appliance.
3
Expand the Access Method tree and click Users. The Top Users report appears.

In the chart view, you can click on either the pie chart or user list to obtain more information from the Log Analyzer. Results are filtered by user, and the setting added to the filter bar.

Alternatively, you can hover your mouse over a user in the User column of the grid view, then right click to filter results. For full details on that user, drill down by clicking on the user name in the column.

Viewing SMA Authentication User Login Report

The Authentication Summary report shows an overview of user logins and login attempts and disconnections by time, user, IP address, type of connection/disconnection, and amount of time the connection was established. Authentication reports are only available at the unit level.

1
Click the Reports tab.
2
Select a SMA appliance.
3
Expand the Authentication tree and click User Login. The Authenticated User Login report appears.

* 
NOTE: All reports appear in the appliance’s time zone.

The user login report shows the login for users that logged on to the SMA appliance during the specified day.

The Report contains the following information:

Time—the time that the user logged in
User—the user name
Initiator IP—the IP address of the user’s computer
Message—the type of connection/disconnect
Duration—the duration of the user login session

Viewing SMA Authentication Failed Login Report

The Authentication Failed Login report shows an overview of user logins and login attempts and disconnections by time, user, IP address, type of connection/disconnection, and amount of time the connection was established. Authentication reports are only available at the unit level.

To view SMA Authentication Failed Login Reports, complete the following steps:
1
Click the Reports tab.
2
Select a SMA appliance.
3
Expand the Authentication tree and click User Login. The Authenticated User Login report appears.

* 
NOTE: All reports appear in the appliance’s time zone.

The failed login report shows the login attempts for users that attempted to log on to the SMA appliance during the specified day.

The Report contains the following information:

Time—the time that the user logged in
User—the user name
Initiator IP—the IP address of the user’s computer
Message—about the type of failed attempt

Viewing Web Application Firewall (WAF) Reports

The Web Application Firewall (WAF) Summary report contains information on the number of connections incurring Application Firewall activity logged by a SonicWall appliance during each hour of the specified day, or at the global or group level, by each group of SonicWall appliances for the day.

The Web Application Firewall provides the following Reports:

Timeline
Threats Detected
Threats Prevented
Apps Detected
Apps Prevented
Users Detected
Users Prevented

Clicking on hyperlinks in these reports take you to the Log Analyzer view, for more details.

To view reports, complete the following steps:
1
Click on the SMA tab and either GlobalView for the group or by individual appliance in the TreeControl view on the left tab of the interface.
2
Click Reports on the middle tab.
3
Select the WAF entry to expand it and click on the Report you want to view.

Viewing Connections Timeline

The WAF Connections timeline displays connections to the web firewall over time.

To view the Web Application Firewall Summary report, complete the following steps:
1
Click the SMA tab.
2
Select a SonicWall appliance.
3
Click Connections > Timeline.

The Timeline displays the unit level summary report containing Offloaded Connections information for an individual SMA system.

Click the hyperlinks available in this report to go to the Log Analyzer.

Viewing WAF Top Threats Detected

The Threats Detected report displays the threats detected, according to signature, classification, and severity.

To view the Web Application Firewall Top Threats Detected report, complete the following steps:
1
Click the SMA tab.
2
Select a SonicWall appliance.
3
Click on the Reports tab.
4
Click WAF > Threats Detected.

The Top Threats Detected screen shows the top threats detected by the firewall, and gives details on the Threat Signature, Threat Classification, Threat Severity, in addition to total threats detected.

Click the hyperlinks available in this report to go to the Log Analyzer.

Viewing WAF Top Threats Prevented

To view the Web Application Firewall Top Threats Prevented report, complete the following steps:
1
Click the SMA tab.
2
Select a SonicWall appliance.
3
Click on the Reports tab.
4
Click WAF > Threats Prevented.

The Top Threats Prevented view shows Top Threats detected and prevented by the web firewall, with details on the Threat Signature, Threat Classification, Threat Severity, in addition to total threats detected.

Viewing WAF Top Applications Detected

To view the Web Application Firewall Top Applications Detected report, complete the following steps:
1
Click the SMA tab.
2
Select a SonicWall appliance.
3
Click on the Reports tab.
4
Click WAF > Applications Detected.

The Top Applications Detected report lists applications with the most number of threats detected by the WAF process. It displays the Application IP, URI and the Detections in order of the number of detections.

Click on the hyperlinks available in this report to go to the Log Analyzer.

Viewing WAF Top Applications Prevented

To view the Web Application Firewall Top Applications Detected report, complete the following steps:
1
Click the SMA tab.
2
Select a SonicWall appliance.
3
Click on the Reports tab.
4
Click WAF > Applications Detected.

The Top Applications Prevented report lists applications with the most number of threats prevented by the Web Application Firewall. It displays the Application IP, URI and the preventions in order of the number of threats prevented by the firewall

Click on the hyperlinks available in this report to go to the Log Analyzer.

Viewing WAF Top Users Detected

The Top Users Detected report lists the top authenticated users from whom threats have been detected by the Web firewall. It displays the User Name, User Agent and the Detections in order of the number of detections.

The Top Users report displays the users who made the most VPN connections on the specified date.

To view the Top Users report, complete the following steps:
1
Click the SMA tab.
2
Select a SonicWall appliance.
3
Click on the Reports tab.
4
Click WAF > Users Detected. The Top Users page displays.

5
The pie chart displays the VPN connections for the top VPN users.
6
The table contains the following information by default:
Users—the user’s login. You can drill down to learn the IP address of the user.
Agent—the User agent and version being used.
Detections—the number of VPN connections in order of number of detections.
MBytes—the number of megabytes transferred.
7
By default, the GMS Reporting Module shows yesterday’s report, a pie chart, and the ten top users. To change the date of the report, use the Search Bar and click the Start or End field to access the pull-down calendar, or click More Options for report display settings.

Viewing WAF Top Users Prevented

To view the Web Application Firewall Top Users Prevented report, complete the following steps:
1
Click the SMA tab.
2
Select a SonicWall appliance.
3
Click on the Reports tab.
4
Click WAF > Users Prevented.

The Top Users Prevented report lists the top authenticated users from whom threats have been prevented by the SonicWall web firewall. It displays their user name, user agent, and preventions, in order of the number of preventions.

Click on the hyperlinks available in this report to go to the Log Analyzer.

Viewing Connection Reports

Connection reports show the number of connections, as well as throughput data, application and user data.

Viewing the Offloaded Connection Timeline

The Offloaded Connection Summary report lists the total connections made for all offloaded applications for one day, displayed per hour per day. The grid section displays peak connections per second, peak throughput, average connections per second, and average throughput per hour.

To view the Offloaded Connections Timeline report, complete the following steps:
1
Click the SMA tab.
2
Select a SonicWall appliance.
3
Click on the Reports tab.
4
Click Connections > Timeline.

The Offloaded Connections Summary report displays.

Viewing the Offloaded Connections Top Applications Report

The Top Applications report lists those applications having the most offloaded connections, as well as information about the application and throughput.

To view the report:

1
Click the SMA tab.
2
Select a SonicWall appliance.
3
Click on the Reports tab.
4
Click Connections > Applications.

The report displays the IP address of the application, the URI, and how many connections were established. The report is drillable on the application IP address to obtain the Log Analyzer report.

Viewing the Offloaded Connections Top Users Report

The Top Users report lists the users who have the most offloaded connections It displays the User Name, User agent, and connections, in order of number of offloaded connections. The report drills down to the Top Applications, filtered by User Name.

To view the report:

1
Click the SMA tab.
2
Select a SonicWall appliance.
3
Click on the Reports tab.
4
Click Connections > Users.

The report drills down to the Top Applications, filtered by User Name.

Viewing Uptime/Downtime Reports

The Uptime/Downtime status timeline displays a timeline of up units in green and down units in red, for a 24-hour period.

Viewing SMA Analyzer Logs

Topics:

Analyzer logs contain detailed information from the system logs on each transaction that occurred on the SMA appliance.

The Log Analyzer allows advanced users to examine raw data for status and troubleshooting information. The Analyzer logs contain detailed information from the system logs on each transaction that occurred on the specified SonicWall appliance. These logs can be filtered or drilled down to further narrow the focus of the information, allowing analysis of data about alerts, traffic, bandwidth consumption, and so on. The Log Analyzer is only available at the individual unit level.

The SMA Log Analyzer contains information about Initiator and Responder IP addresses, Status Messages, User and Services used, as well as the time and duration of the session.

You can filter the log on IP address, Message, User, or Service.

Clicking hyperlinks on SMA Reports takes you the Analyzer Log view of the information. Log information can be saved by using the Save icon on the Filter Bar for a specific report. This report then appears in the list of Custom Reports.

For more information on the Log Analyzer, refer to Using the Log Analyzer.

Saving System Log Reports

To load the report for later viewing, either:
1
Click Load Custom Report and select from the pull-down list of saved Custom reports.
2
Click on Analyzers > Log Analyzer.
* 
NOTE: The Log Analyzer entries display raw log information for every connection. Depending on the amount of traffic, this can quickly consume a large amount of space in the database. It is highly recommended to be careful when choosing the number of days of information that will be stored. For more information, see Configuring SMA Scheduled Reports and Universal Scheduled Reports.

You can also click on the print icon to save a log to PDF of Excel format.

* 
NOTE: Saved system logs are limited in the number of rows that are saved. If saving to PDF, a maximum of 2500 rows are saved. If saving to Excel, a maximum of 10,000 rows are saved.

Viewing the Analyzer Log for a SMA Appliance

To view the Log, complete the following steps:
1
Click the Reports tab.
2
Select a SMA appliance.
3
Expand the Analyzer tree and click on Log Analyzer. The saved Log report page displays.

Syslog Exclusion Filter

Filters allow you to fine-tune what information is displayed in Reports. Filters allow you to narrow search results and view subsets of report data.

Use this screen to manage the volume of syslog uploaded to the reporting database. The factory default filters are configured to upload only the syslog needed to generate the reports. This can be fine tuned further, but it required advanced knowledge of the syslog and consequently should be completed by experts only. Adding a wrong filter could lead to receiving a “No Matching Records Found” message.

To add a filter, complete the following steps:
1
Click on Configuration > Filters.

The Syslog Exclusion Filter page comes up. This page allows you to view filters currently applied, add filters, or remove filters.

2
To configure and add a filter, click Add Filter. The Add Filter menu comes up.

3
Specify the field you want to modify, and select an operator and value. Click Update.

Alerts

The Events entry on the Reports tab allows you to configure and view alerts specific to “Reporting for the unit selected.” The Events entry on the Reports tab allows you to configure and view alerts specific to Reporting for the unit selected, through the Alert Settings and Current Alerts items.

You can follow specific alerts. For more information, refer to Granular Event Management Overview.

1
Click on Events > Alert Settings.

The Alerts menu comes up. You can use this menu to search for Alerts by name or type, either by exact match or matching strings. Click Search to find an Alert of interest.

2
You can also add an alert. Click Add Alert on the Alerts menu. The resulting pop-up menu allows you to specify the type of data you want to track, how often to poll for data, and whether it is visible to only administrators or to non-administrators as well.

Alert Types are pre-defined, static parameters and are not customizable. Available Alert types for SMA are:

 

Available Alert types for SMA

Alert Type

Description

Bandwidth usage (Billing Cycle)

Tracks the bandwidth total in bytes per billing cycle. The value that the threshold will use is Numeric.

Bandwidth Usage (Daily)

Tracks the daily bandwidth total in bytes. The value that the threshold will use is Numeric.

Events/Hits (Total)

Tracks the daily events/hits total. The value that the threshold will use is Numeric.

3
Select the Alert Type and click on Edit Content to edit threshold values. A popup menu appears. You can choose from the preset Threshold values or create a new threshold value by clicking the icon to the right of the Threshold banner. Only one new threshold can be created at a time. For more information on thresholds, see Configuring Event Thresholds.
* 
NOTE: Threshold values might not be available for all Alert types. If this is the case, the Edit Content field is not present.
4
Alerts can be emailed to you or a specified destination on a regular schedule. You can specify up to five destinations. Click Add Destination to enable and select from the pull-downs of destination and schedule entries.
5
Click Update when you have finished configuring the Alert. It is added to the list of Alerts on the menu.

Custom Reports

You can configure a report with customized filters, then save it for later viewing and analysis. Saving a Report allows you to view it later, by loading it through the Custom Reports interface. Custom Reports can either be saved directly, or configured through the Universal Scheduled Reports. You can either load the report through the Custom Report pull-down on the Search Bar, or click Reports > Custom and choose from the list of saved Custom reports.

Custom Reports are available at the unit level for all appliances visible on the SMA tab. The Log Analyzer must be enabled for the appliance.

The Manage Reports screen (Custom Reports > Manage Reports) allows you to view what Custom Reports are available and delete reports from the system.

For more information on Custom Reports, refer to Custom Reports.