User guide
Viewing the Security Log
388 Check Point Safe@Office User Guide
This column...
Displays...
Service The protocol and destination port used for the connection.
Reason The reason the action was logged.
Rule The number of the firewall rule that was executed.
Net The internal network where the action occurred.
Information Additional information about the logged action.
Table 70: Security Log Actions
Action
Icon
Description
Connection Accepted
The firewall accepted a connection.
Connection Decrypted
The firewall decrypted a connection.
Connection Dropped
The firewall dropped a connection.
Connection Encrypted
The firewall encrypted a connection.
Connection Rejected
The firewall rejected a connection.
Connection Monitored
A security event was monitored; however, it was not blocked,
due to the current configuration.
URL Allowed
The firewall allowed a URL.
URL Filtered
The firewall blocked a URL.
Virus Detected
A virus was detected in an email.
Potential Spam Stamped
An email was marked as potential spam.