User guide

Viewing the Security Log
384 Check Point Safe@Office User Guide
To view the security log
1. Click Logs in the main menu, and click the Security Log tab.
The Security Log page appears.
The log table contains the columns described in Security Log Columns on page 387.
The log messages are color-coded as described in Security Log Color Coding on page
389.
2. To display information about a connection source or destination, click the
relevant IP address.
The Safe@Office appliance queries the Internet WHOIS server, and a window
displays the name of the entity to whom the IP address is registered and their contact
information. This information is useful in tracking down hackers.
3. To view information about a destination port, click the port.
A window opens displaying information about the port.