Intrusion Prevention Events

By default, the Vulnerability ProtectionDeep Security Manager collects Firewall and Intrusion Prevention Event logs from the Vulnerability ProtectionDeep Security Agents/Appliances at every heartbeat.

Once collected by the Vulnerability ProtectionDeep Security Manager, Event logs are kept for a period of time which can be set Administration > System Settings > Storage. The default setting is one week.

From the main page you can:

Additionally, right-clicking an Event gives you the option to:

Columns for the Intrusion Prevention Events display:

View Event Properties

Double-clicking an event displays the Properties window for that entry. The Tags tab displays tags that have been attached to this Event. For More information on Event tagging, see Policies > Common Objects > Other > Tags, and Event Tagging in the Reference section.

Filter the List and/or Search for an Event

Selecting "Open Advanced Search" from the "Search" drop-down menu toggles the display of the advanced search options.

The Period toolbar lets you filter the list to display only those events that occurred within a specific timeframe.

The Computers toolbar lets you organize the display of event log entries by computer groups or computer Policies.

Advanced Search functions (searches are not case sensitive):

Pressing the "plus" button (+) to the right of the search bar will display an additional search bar so you can apply multiple parameters to your search. When you are ready, press the submit button (at the right of the toolbars with the right-arrow on it).

Export

Clicking the Export... button exports all event log entries to a CSV file.

Auto-Tagging

Clicking Auto-Tagging... displays a list of existing Intrusion Prevention Auto-Tagging Rules.