Log Schemas
Network threat detection log
AR event statistics
User audit information (successful connections/failures/activity logs)
TCP and UDP Traffic Statistics
Real-time Detection and System Events
Ethernet Traffic Statistics
Frame Traffic Statistics
Traffic Statistics by Inline
Protocol Traffic Statistics
Service Traffic Statistics
Traffic Statistics
VIPS Frame Traffic Statistics
VIPS Malicious Traffic Statistics
VIPS Protocol Traffic Statistics
VIPS Service Traffic Statistics
VIPS Traffic Statistics