Chat now with support
Chat with Support

Welcome, erwin customers to Quest Support Portal click here for for frequently asked questions regarding servicing your supported assets.

InTrust 11.3 - InTrust Reports

Active Roles Server Events

Active Roles Server event statistics by Computer

This InTrust report summarizes Active Roles Server events and groups them by computer (where they were logged).

Active Roles Server events by eventID

For Active Roles Server 6.0 this InTrust report represents ARS events grouped by event ID. The upper pane shows how many events with specific IDs occurred. The lower left pane lists all events with one specific ID. Click an event to view its description or insertion strings in the lower right pane. Note. The report is intended for interactive use only, not for print.

Active Roles Server startup failures

This InTrust report helps determine the time period during which the ARS service was unavailable because it had not started. The report assumes that service recovery time is the time between nearest failure event and a successful service start. You can use the information when assessing your environments SLA compliance.

All Active Roles Server events

This InTrust report represents ARS events as they appear in the event log. Click the description or insertion strings link to see the details in a sub-report.

Firewalls Reports

This section contains a list of reports included in the InTrust 11.3 Report Pack for Cisco PIX and CheckPoint Firewall-1.

CheckPoint Firewall-1

CheckPoint Firewall accepted connections

This InTrust report rates successful connections. In terms of the report, a connection is defined by the protocol, the local address within the environment and the foreign address outside it. The report helps analyze connection statistics and track abnormally frequent or numerous connections.

CheckPoint Firewall dropped connections

This InTrust report rates dropped connections. In terms of the report, a connection is defined by the protocol, the local address within the environment and the foreign address outside it. The report helps find out what kinds of connections are dropped by CheckPoint and track IP addresses at which such activity is attempted. The most numerous connections from a specific local IP address to a specific foreign IP address are on top.

CheckPoint Firewall events

This InTrust form helps you perform detailed analysis of CheckPoint Firewall events and easily detect frequent events of the same type. Use the top pane of the form to sort events. Click an entry in this pane to see details of grouped events below.

CheckPoint Firewall rules statistics

This InTrust report rates CheckPoint Firewall rules by number of rule matches. Rules that were matched the most times are on top. The report helps find out which rules are not matched and remove or modify them. Click a number to view a sub-report with the number of matches that the number stands for.

Cisco PIX

Cisco PIX connections

This InTrust report shows connections processed by Cisco PIX. In terms of the report, a Cisco PIX connection is defined by the protocol, the local address within the environment and the foreign address outside it. The report helps analyze statistical data on connections, find out anomalies and trends.

Cisco PIX events

This InTrust form helps you perform detailed analysis of Cisco PIX events and easily detect frequent events of the same type. Use the top pane of the form to sort events. Click an item in this pane to see its details of grouped events below.

Cisco PIX traffic

This InTrust report shows how much traffic was generated by connections through Cisco PIX.

Related Documents

The document was helpful.

Select Rating

I easily found the information I needed.

Select Rating