About intrusion detection system (IDS) logs

Note: To view this log data, you need a Unified Threat Management license.

These logs contain details of suspicious network activity detected by the IDS. You can also export IDS logs to a chosen format.