There are four types of internal logs provided for Threater applications:
- Packet Logs show connections by IP, Country and ASN in Enforce
- Domain Logs display connections by Domain in Enforce, if DNS encryption is not used for the connection
- System Logs show notices, errors and emergency alerts for the Enforcer
- Audit Logs are available in both Enforce and Portal and provide user activity or changes within each instance of Threater
Packet, Domain, System and Enforce specific Audit Logs are only available in Enforce.
Audit Logs in the Portal, or Command Logs, show a running history of actions taken by users of the Portal system. This can be useful for auditing and troubleshooting user changes made in the Portal. Any insights into IP or ASN activity (allowing, blocking, etc) should be investigated in the Enforce console under Logging > Internal Logs.
Command Log includes the date of the action, the user that made the changes, the initiator's type, the module or section of the Portal where the changes were made, the action taken and a brief message or description of the changes.
|User Logs in
|User has made changes to scheduled reports
|Changes made to Policies
|Adjustments to Allow IP entry
|Adjustments to Block IP entry
|Changes to Lists
|Adjustments to Edge Instances
|Changes to Networks or Ports
|Changes to Subscriptions
|Changes to ASN
|Changes in User Management
|Add new entries
|Edit existing entries
|Deactivate or remove existing entries