![]() When suspicious activity is detected, it is important to collect information about You use filters when viewing logs, but filters can also be used for other tasks, suchĪs exporting logs and selecting data for reports.ĭiagrams allow you to visualize your network security environment. Reports are summaries of logs and statistics that allow you to combine large amountsįilters allow you to select data based on values that it contains. View data from SMC servers, all types of engines, and from third-party components that are configured You can view log, alert, and audit entries through the log browsing views. The SMC can be configured to log and monitor other manufacturers’ devices in much the same In the Management Client by allowing your Management Server to contact Forcepoint servers. You can view maintenance contract and support level information for your licenses
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |