FAQ

What is the notification specification of the incident report in the Network-based Security menu?

(:Last updated)

Correlatively analyze multiple types of logs (IPS logs, IDS logs, URL logs, etc.) detected by customer's equipment, and send them to customers as threats in case of threats.

Although there are various creation opportunities for reports, as an example, scanning activity may be detected from many hosts.

Please understand beforehand that this logic is not disclosed for security reasons.

Is this page helpful?

Yes No

We appreciate your cooperation in improving the site

Did this FAQ be helpful? If you have any comments, please let us know.

Thank you

Your feedback has been received.