User Manual Part 1

Table Of Contents
Viewing the Security Log
348 Check Point Safe@Office User Guide
This column... Displays...
Service The protocol and destination port used for the connection.
Reason The reason the action was logged.
Rule The number of the firewall rule that was executed.
Net The internal network where the action occurred.
Information Additional information about the logged action.
Table 59: Security Log Actions
Action Icon Description
Connection accepted
The firewall accepted a connection.
Connection decrypted
The firewall decrypted a connection.
Connection dropped
The firewall dropped a connection.
Connection encrypted
The firewall encrypted a connection.
Connection rejected
The firewall rejected a connection.
URL Allowed
The firewall allowed a URL.
URL Blocked
The firewall blocked a URL.
Spam Stamped
VStream Antispam marked an email as spam.
Spam Detected
VStream Antispam rejected a spam email.
Connection Monitored
A security event was monitored; however, it was not blocked,
due to the current configuration.
Mail Allowed
VStream Antispam logged a non-spam email.