
ManageEngine Firewall Analyzer :: User Guide
30
Zoho Corp.
Search From
In this section, you can select one from the two options:
1. Aggregated Logs Database
2. Raw Firewall Logs
3. Raw Proxy Logs
1. Aggregated Logs Database
Select this option if you want to search from the aggregated logs
database.
2. Raw Firewall Logs
Select this option if you want to search from the raw firewall logs.
Selecting this option will enable the following options:
a. Raw VPN Logs
b. Raw Virus/Attack Logs
c. Raw Device Management Logs
d. Raw Denied Logs
Select the above logs options as per your requirement.
3. Raw Proxy Logs
Select this option if you want to search from the raw Proxy server logs. All
Squid, ISA proxy logs will be indexed in real time (i.e., whenever
imported).
Hence, all logs are searchable.
Define Criteria
This section, enables you to search the database for attributes using more than one
following criteria's:
Protocol
Refers to the list of protocols and protocol identifiers that are available in the
Protocol Groups page (Settings >> Protocol Groups)
example: 8554/tcp, rtsp, IPSec
Source
Refers to the source host name or IP address (CIDR format also) from which
requests originated
Destination
Refers to the destination host name or IP address (CIDR format also) to
which requests were sent
User
Refers to the authenticated user name required by some firewall's
example: john, kate
Virus
Refers to the Virus name.
examples: JS/Exception, W32/Mitglieder
Attack
Refers to the attack name.
examples: UDP Snort, Ip spoof
Refers to the URL, which you want to search
Refers to the Firewall Rule, which you want to search
Refers to the device from which logs are collected
Refers to the log message texts stored in the DB
Commentaires sur ces manuels