The following columns are provided for you to select the log item data you are
interested in to display in the table.
|
Column Name
|
Description
|
||
|
Time
|
Local time (the TMWS region where
the user is registered) of the log item
|
||
|
User Name
|
User name or IP address of the client that initiated the request
|
||
|
Active Directory Domain
|
Active Directory domain of the user whose client initiated the
request
|
||
|
Department
|
Department of the user whose client initiated the request
|
||
|
Device
|
Roaming users or TMWS gateway where the web traffic passed
|
||
|
Domain
|
Domain that was requested
|
||
|
URL
|
URL that was requested
|
||
|
MIME Type
|
MIME type of the content requested
|
||
|
Size
|
Body size of the HTTP request or response
|
||
|
Server IP
|
IP address of the server requested
|
||
|
Client IP
|
IP address of the client that initiated the request
|
||
|
SHA-1
|
SHA-1 hash value of the file requested
|
||
|
WRS Score
|
WRS score of the web page requested
|
||
|
URL Category
|
Predefined or customized category of the URL requested
|
||
|
Malware Name
|
Name of the malware detected
|
||
|
App Name
|
Name of the application requested
|
||
|
Action
|
Action that was taken
|
||
|
Rule Name
|
Name of the cloud access rule triggered
|
||
|
Profile/Template Name
|
Name of the Threat Protection template or Data Loss Prevention profile
triggered
|
||
|
Block Reason
|
Reason why the block action was taken
|
||
|
MAC Address
|
MAC address of the Windows endpoint running the Enforcement Agent
|
