User Manual
Page 55
Monitor this list for added security. Chapter 2: System -- 45 See "The Log Tab" on or logs out. Information Security Gateway To review or audit an account, click Login Status. The following screen appears: A log is created each time a user logs on page 94.
Monitor this list for added security. Chapter 2: System -- 45 See "The Log Tab" on or logs out. Information Security Gateway To review or audit an account, click Login Status. The following screen appears: A log is created each time a user logs on page 94.
User Manual
Page 94
...The following means that the top category is Message Exchange (IM). 84 -- DFL-M510 TWO LEVELS TOP N ANALYSIS Administrators can review detected application patterns by information revealed from the six charts; These monitoring charts have two levels. The following means that the top category is chosen,... to quickly understand the present status of incidents,) and are all displayed in charge, or keeping logs of the network. Chapter 5: Real Time Monitor All triggered incidents are categorized on the principle of sequence, health, time of occurrence, name of pattern, source address...
...The following means that the top category is Message Exchange (IM). 84 -- DFL-M510 TWO LEVELS TOP N ANALYSIS Administrators can review detected application patterns by information revealed from the six charts; These monitoring charts have two levels. The following means that the top category is chosen,... to quickly understand the present status of incidents,) and are all displayed in charge, or keeping logs of the network. Chapter 5: Real Time Monitor All triggered incidents are categorized on the principle of sequence, health, time of occurrence, name of pattern, source address...