Customize the Events log to display as many or few columns that meet your needs.
To select which columns to display:
Click Grid icon . The Grid Settings dialog displays:
Select the items you want to appear as columns in the Threat Log.
| Category Name | Column |
|---|---|
| Timestamp | Time |
| Application | Application |
| Component | |
| URL | URL |
| URL Rating | |
| URL Severity | |
| User Name | User Name |
| Threat | Virus |
| Intrusion | |
| Spyware | |
| Botnet | |
| Time | Start Time |
| Last Updated | |
| IP Address | Initiator IP |
| Responder IP | |
| IP | Protocol Name |
| Port | Initiator Port |
| Responder Port | |
| Country | Initiator |
| Responder | |
| FileName | FileName |
| Capture ATP | Action |
| Interface | Initiator Interface |
| Initiator Interface | |
| BWM | Inbound Priority |
| Outbound Priority | |
| Statistics | All Counters |
| Initiator Bytes | |
| Responder Bytes | |
| Status | Flow Status |
| Blocked Reason | |
| Policies | Security Rule |
| NAT Rule | |
| Init Route Rule | |
| Resp Route Rule | |
| Decryption SSL Rule | |
| Decryption SSH Rule | |
| DoS Rule | |
| MAC | Init MAC |
| Responder MAC | |
| Miscellaneous | Initiator Gateway |
| Responder Gateway | |
| Initiator VPN Name | |
| Gateway VPN Name |