Alerts

Alerts

Hi,

I have created an Alert profile to receive emails whenever firewall analyzer receives a syslog entry that contains login attempt.

The rule I have created is:

Match all of the following - The message contains login attempt

The new rule does not seem to work. Any idea what could be the problem.

Bellow is a sample syslog entry:

Oct 16 09:24:37 192.168.x.y hostname: NetScreen device_id=hostname [Root]system-notification-00002: Admin user "usename" login attempt for Web(http) management (port 80) from 192.168.x.y:2446 failed. (2006-10-16 09:24:38)


Thank you

Ramzi
















                New to ADSelfService Plus?