The Security log records all attack attempts aimed at your computer that Net Defense has blocked. This includes port scans and denial of service attacks. Net Defense looks for certain patterns when it determines if traffic is suspicious. Sometimes, Net Defense identifies traffic as an attack because the type of traffic has triggered a threshold. Examine the Security log to determine if the traffic really is an attack.
§ The Time is the date and time that Net Defense logged the event.
§ The Security Type is the type of hacking attempt, such as Port Scan, Denial of Server, Trojan horse, and so on.
§ The Severity is the attempt’s severity level — Critical, Major, or Minor.
§ The Direction is the source from which the attempt originated. Most attacks are Inbound — they originate from another computer and attempt to enter yours. Other attacks, like Trojan horses, are programs that you might download onto your computer that then attack from within your computer, and are considered Outbound.
§ The Protocol is the type of protocol used in the attempted attack — ICMP, TCP, or UDP.
§ The Local IP is your computer’s Internet protocol address.
§ The Remote Host is the other computer’s name.
§ The Application Involved is the name and path of the program involved in the attempt.
§ The Count is the number of attacks logged.
See Also