EasyManua.ls Logo

Check Point QUANTUM SPARK 1570 - Page 259

Check Point QUANTUM SPARK 1570
311 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Logs and Monitoring
R81.10.X Quantum Spark 1500, 1600, 1800, 1900, 2000 Appliances Centrally Managed Administration Guide|259
To search for a security log
Enter your query in the Enter search query search field on the right side of the screen and
click the search icon .
If you require assistance to create a query:
1.
Click the Query Syntax icon next to the search field.
2. The Query Syntax window opens and shows examples for:
n
General Search - A simple string or an IP address.
Example: 203.0.113.64
n
Focused Search - <Field-Name>:<criteria>. The Field Name can be the name of
a table column or a field from the log details.
Example: action:drop or source port:22
n
You can use operators in your search. Examples:
[NOT] text1 AND [NOT] text2 AND [NOT] textn
[NOT] text1 OR [NOT] text2 OR [NOT] textn
[NOT] field1:value1 AND [NOT] field2:value2 AND [NOT]
fieldn:valuen
[NOT] field1:value1 OR [NOT] field2:value2 OR [NOT]
fieldn:valuen
Notes:
n
Search is not case-sensitive.
n
Make sure there is no space between the field name and the search
criteria.
To limit the number of logs to search:
1. Click the Settings tab.
2. In the Security Logs Settings window, select the checkbox Limit the number of logs
to search.
3. In the Maximum number of logs to search field, use the arrows to select the desired
number.
4. Click Save.

Table of Contents

Other manuals for Check Point QUANTUM SPARK 1570

Related product manuals