User Manual Part 1

Table Of Contents
Viewing the Security Log
344 Check Point Safe@Office User Guide
To view the event log
1. Click Logs in the main menu, and click the Security Log tab.
The Security Log page appears.
The log table contains the columns described in Security Log Columns on page 347.
The log me
ssages are color-coded as described in Security Log Color Coding on page
349.
2. To display
information about a connection source or destination, click the
relevant IP address.
The Safe@Office appliance queries the Internet WHOIS server, and a window
displays the name of the entity to whom the IP address is registered and their contact
information. This information is useful in tracking down hackers.
3. To view information about a destination port, click the port.
A window opens displaying information about the port.
4. To navigate the log table, do any of the following:
To scroll through the displayed log page: