Sangfor HCI and aSV provide a unified infrastructure combining compute, storage, networking, and built-in security to simplify deployment, operations, and services.
This feature allows you to query security logs, including virus scan logs, brute-force attack logs, cyber attack logs, and vulnerability scan logs, to facilitate security event analysis and processing.
Prerequisites
N/A
Precautions
N/A
Steps
Go to aSecurity > Security Logs and query logs. For cyber attack logs, you can add a detection rule to the whitelist to allow the cyber attack event. To modify the rule subsequently, go to Security Settings > Blacklist and Whitelist Management. For details, see section 9.5.3 "Blacklist and Whitelist Management."