Getting Started : Step 8: Monitor the system and become familiar with logs and reports
 
Step 8: Monitor the system and become familiar with logs and reports
For your initial deployment, continue to use Detection Mode for a day or two during which you review logs for potential false positives and false negatives.
Basic steps
1. Go to the Monitor menu and review throughput rates. Start with aggregate graphs and then use the more detailed graphs to drill in on patterns of interest or concern.
2. Go to Log & Report > Log Access > DDoS Attack Log and become familiar with the log table and how to use log filters.
3. Go Log & Report > Report Browse > Executive Summary and become familiar with the Executive Summary dashboard.
4. Go Log & Report > Attack Graphs and become familiar with the Attack Graphs dashboard.
Figure 36: Monitor graphs
For details, refer to the online help or see “Using Traffic Monitor Graphs”.
Figure 37: DDoS Attack Log table
For details, refer to the online help or see “Using the DDoS Attack Log table”.
Figure 38: Executive Summary dashboard
For details, refer to the online help or see “Using the Executive Summary dashboard”.
Figure 39: Attack Graph dashboard
For details, refer to the online help or see “Using the Attack Graph dashboard”.