17.1.4. IDPS log

The intrusion detection system log displays the triggered IPS signatures for which the logging or blocking action has been set. The following information is displayed:

  • PCAP files.

  • UserGate node where the event occurred.

  • Time.

  • Event details.

  • User.

  • Action.

  • Rule.

  • Signatures.

  • Application.

  • Network protocol.

  • Source zone.

  • Source IP address.

  • Source port.

  • Source MAC address.

  • Destination zone.

  • Destination IP address.

  • Destination port.

  • Destination MAC address.

Administrators can select to display only the columns they need. To do this, click on any of the columns and set the checkmarks for the columns you want to display in the context menu that appears.

To assist in finding the events of interest, the records can be filtered by various criteria such as the protocol, date range, action, etc.

By clicking Export as CSV the administrator can save the filtered log data in a .csv file for subsequent analysis.

Click Show to open a window with a detailed event description.