About intrusion detection system (IDS) logs

Note: To view this log data, you need a Unified Threat Management license.

These logs contain details of suspicious network activity detected by the IDS. You can also export IDS logs to a chosen format.

Things you can do here

Exporting Intrusion Detection System (IDS) logs

Page reference details


Something not right? .