User's Manual

Configuring Security Settings
6.10 Security Log
6
120
6.10d Details
Displays a textual description of the event.
6.10e Security Log Settings
To view or change the security log settings:
Click 1. Settings in the Security Log screen. The “Security Log Settings”
screen appears.
Select the type of activities that will generate a log message:2.
Accepted Incoming Connectionss - activating this check box generates a log
message for each successful attempt to establish an inbound connection to
the local network.
Accepted Outgoing Connectionss - activating this check box generates a
log message for each successful attempt to establish an outgoing connection
to the public network.
Select the type of blocked events to be listed in the log:3.
All Blocked Connection Attemptss - activating this check box generates log
messages for all blocked events.