Monitor Screen Events
You are here: Monitor > Events > Screen.
Use screen events to view the information about security events based on screen profiles. Analyzing screen logs yields information such as attack name, action taken, source of an attack, and destination of an attack.
You can select either the Grid View tab or the Chart View tab to view your data:
Grid View—View the comprehensive details of all screen events in a tabular format that includes sortable columns. You can group the events using the Group By option. For example, you can group the events based on source country. The table includes information such as the event name, source country, source address, destination country, attack name, and so on. Table 1 describes the fields on the Grid View page.
Chart View—View a brief summary of all the screen events in your network. The top of the page has a swim lane graph of all the screen events. You can use the widgets at the bottom of the page to view critical information such as, top screen attackers, top screen victims, and top screen hits. Table 2 describes the widgets on the Chart View page.
Table 1: Screen—Fields on the Grid View Page
The filter list that is displayed above the grids.
Options available in the filter list are:
Select the criteria or parameter on which you want to construct the filter statement.
Executes the filter statement that is displayed in the text box.
Clears the filters.
Show Hide Column Filter icon represented by three vertical dots
Enables you to show or hide a column in the grid.
Displays the time when the log was received.
Displays the event name of the log.
Displays the source country of the log.
Displays the source address from where the event occurred.
Displays the destination country of the log.
Displays the destination address of the event.
Displays the destination port of the event.
Displays the source port of the event.
Displays brief description of the event.
Source Zone Name
Displays the name of the source security zone of the traffic that triggered the event.
Displays the host name of the device where the log was generated.
Displays the action taken for the event. For example, warning, allow, and block.
Displays the name of the interface.
Displays the network or subnetwork to which the device belongs.
Table 2: Screen—Widgets on the Chart View Page
Top Screen Attackers
Displays the top source countries from where the event source originated; sorted by the number of source IP addresses.
Top Screen Victims
Displays the top destination countries targeted for the attack; sorted by the number of destination IP addresses.
Top Screen Hits
Displays the top source IP addresses of the network traffic; sorted by the number of event occurrences.