User Manual Part 1
Table Of Contents
- Check Point Safe@Office User Guide 8.0
- Copyright & Trademarks
- Contents
- About This Guide
- Introduction
- About Your Check Point Safe@Office Appliance
- Safe@Office 500 Product Family
- Product Features
- Wireless Features
- Optional Security Services
- Software Requirements
- Getting to Know Your Safe@Office 500 Appliance
- Getting to Know Your Safe@Office 500W Appliance
- Getting to Know Your Safe@Office 500 ADSL Appliance
- Getting to Know Your Safe@Office 500W ADSL Appliance
- Contacting Technical Support
- Safe@Office Security
- Installing and Setting Up Safe@Office
- Getting Started
- Configuring the Internet Connection
- Managing Your Network
- Using Bridges
- Configuring High Availability
- Using Traffic Shaper
- Working with Wireless Networks
- Viewing Reports
- Viewing Logs
- Setting Your Security Policy
Viewing the Security Log
344 Check Point Safe@Office User Guide
To view the event log
1. Click Logs in the main menu, and click the Security Log tab.
The Security Log page appears.
The log table contains the columns described in Security Log Columns on page 347.
The log me
ssages are color-coded as described in Security Log Color Coding on page
349.
2. To display
information about a connection source or destination, click the
relevant IP address.
The Safe@Office appliance queries the Internet WHOIS server, and a window
displays the name of the entity to whom the IP address is registered and their contact
information. This information is useful in tracking down hackers.
3. To view information about a destination port, click the port.
A window opens displaying information about the port.
4. To navigate the log table, do any of the following:
• To scroll through the displayed log page: