12.1.6. SSH Inspection Log

The SSH inspection log shows the triggered SSH inspection rules for which logging is enabled. The following information is displayed:

  • UserGate node where the event occurred.

  • Time.

  • User.

  • Action.

  • Rule.

  • Command.

  • Source zone.

  • Source IP address.

  • Source port.

  • Source MAC address.

  • Destination zone.

  • Destination IP address.

  • Destination port.

Administrators can select to display only the columns they need. To do this, click any of the columns and set the check marks for the columns you want to display in the context menu that appears.

To assist in finding the events of interest, the records can be filtered by various criteria such as the protocol, date range, action, etc.

By clicking Export as CSV, the administrator can save the filtered log data in a .csv file for subsequent analysis.

Click Show to open a window with a detailed event description.