Alto MS Series User Manual Page 32

  • Download
  • Add to my manuals
  • Print
  • Page
    / 108
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 31
28 Getting Started Guide
Monitor the Firewall Integrate the Firewall into Your Management Network
Config Logs—Enable forwarding of Config logs by specifying a Server Profile in the log settings
configuration. (
Device > Log Settings > Config Logs).
System Logs—Enable forwarding of System logs by specifying a Server Profile in the log settings
configuration. (
Device > Log Settings > System Logs). You must select a Server Profile for each severity level
you want to forward. For a partial list of system log messages and their corresponding severity levels, refer
to the
System Log Reference. The following table summarizes the system log severity levels:
WildFire Logs—Enable forwarding of WildFire logs that contain information about files that are
forwarded from the firewall to WildFire for analysis. You can configure the firewall to forward logs for the
verdict Benign and/or Malicious.
Severity Description
Critical
Serious threats such as those that affect default installations of widely
deployed software, result in root compromise of servers, and the exploit
code is widely available to attackers. The attacker usually does not need
any special authentication credentials or knowledge about the individual
victims and the target does not need to be manipulated into performing
any special functions.
High
Threats that have the ability to become critical but have mitigating factors;
for example, they may be difficult to exploit, do not result in elevated
privileges, or do not have a large victim pool.
Medium
Minor threats in which impact is minimized, such as DoS attacks that do
not compromise the target or exploits that require an attacker to reside on
the same LAN as the victim, affect only non-standard configurations or
obscure applications, or provide very limited access.
Low
Warning-level threats that have very little impact on an organization's
infrastructure. They usually require local or physical system access and
may often result in victim privacy or DoS issues and information leakage.
Data Filtering profile matches are logged as Low.
Informational
Suspicious events that do not pose an immediate threat, but that are
reported to call attention to deeper problems that could possibly exist.
URL Filtering log entries with a benign verdict are logged as
Informational.
Severity Description
Critical
Hardware failures, including HA failover and link failures.
High
Serious issues, including dropped connections with external devices, such
as LDAP and RADIUS servers.
Medium
Mid-level notifications, such as antivirus package upgrades.
Low
Minor severity notifications, such as user password changes.
Informational
Log in/log off, administrator name or password change, any
configuration change, and all other events not covered by the other
severity levels.
Page view 31
1 2 ... 27 28 29 30 31 32 33 34 35 36 37 ... 107 108

Comments to this Manuals

No comments