Topics Topics

Intrusion Detection Log Details

The Intrusion Detection Log provides detailed audit information about potential malicious events that have been detected and tracked.

The following table describes all fields in the log:

TimeThe date and time of the potential malicious event.
EventThe description of the potential malicious event.
DetailThe notes log message for the potential malicious event as well as the time stamp.
Triggered by MonitorThe monitor(s) which triggered the log. It will show the description of the monitor, if the monitor description exists. Otherwise, it shows the document ID for the monitor document. A link allows you to open the Monitor document that triggered the log.
Originating LogThe Log.nsf log document that stores this event.