Note: To view this log data, you need a Unified Threat Management license.
These logs contain details of suspicious network activity detected by the IDS. You can also export IDS logs to a chosen format.
Things you can do here
Exporting Intrusion Detection System (IDS) logs
Page reference details
Something not right? Send us feedback.
Copyright © 2000-2020 Smoothwall Ltd. All rights reserved.