About intrusion detection system (IDS) logs
Note: To view this log data, you need a Unified Threat Management license.
These logs contain details of suspicious network activity detected by the IDS. You can also export IDS logs to a chosen format.
Note: To view this log data, you need a Unified Threat Management license.
These logs contain details of suspicious network activity detected by the IDS. You can also export IDS logs to a chosen format.
Something not right with this topic? Email us at [email protected].