Submit a ticketCall us

Don’t fall victim to a ransomware attack
Backups are helpful, but sometimes that’s not enough to protect your business against ransomware. At our live webcast we will discuss how to protect against ransomware attacks with SolarWinds® Patch Manager and how to leverage log data to detect ransomware. Register now for our live webcast.

Home > Success Center > Firewall Security Manager (FSM) > Log files for report generation

Log files for report generation

Table of contents
Created by Interspire Import, last modified by Karen Valdellon on Jul 02, 2017

Views: 31 Votes: 1 Revisions: 9

Overview

This article provides information about FSM log file requirements for report generation.

Environment

All FSM versions

Detail

In Firewall Security Manager (FSM), the device configuration details are stored in the FSM database.

Some of the reports like Profiler Summary Report need to show the latest config changes of the selected device, which may not be available in the FSM database. The Rule Object Cleanup Report also requires the log file, if you need the log usage analysis as part of the report. The latest device configuration changes and the usage details will be available only in the log file. To run these reports, you need to provide the latest log file of the selected device.

Last modified
05:58, 2 Jul 2017

Tags

Classifications

Public