API Traffic Logs
Introduces information related to monitoring API traffic logs.
API traffic logs are used to record all file data behaviors in the WebService API channel, including Data Loss Prevention (DLP) scanning, data masking, virus scanning, and recording data that does not hit the Data Loss Prevention (DLP) policy.
Manage the real-time API traffic logs monitored in the
page.The logs display the following information.
Displayed Column/Filter Condition | Introduction |
---|---|
Traffic UUID | Traffic unique identifier |
Incident | The security incident recorded in the log |
User | The user involved in the incident. |
Department | Departments configured in the organizational structure or synchronized from the user directory |
Source IP | Source IP address |
Detection Time | The time when the security engine detects a violation incident that triggers a policy |
Channel | The channel where the incident occurred (HTTP/HTTPS/FTP/IM/SMTP/custom protocol/network printing/MAP/POP3/WebService application/file sharing) |
Policy Name | The DLP (Data Loss Princidention) security policy that matched with the incident |
Target | The target information of the data, which can be displayed as user name (user identification module)/IP address/URL address/device name (Endpoint USB/DVD/Printing)/Email address |
Virus Name | The virus name found in the accessed content by the virus engine |
Detection Engine | The name of the security engine that detected the violation incident |
File Name | The file name involved in the event, which may be multiple |
RMS Decryption | Whether the RMS decryption feature is enabled |
WebService Operation | The WebService operation associated with the incident |
Detection Type | The type of incident detection |
Masking Method | The masking method for the involved sensitive information |
Masking Policy | The masking policy for the involved sensitive information |
Storage Path/Storage Bucket | The system supports the following cloud storage methods for API access to perform Data Loss Prevention (DLP) content analysis, data masking, and virus scanning:
|