Deep Security 11 has reached end of support. Use the version selector (above) to see more recent versions of the Help Center.
Web reputation events
For general best practices related to events, see Events in Deep Security.
To see the web reputation events captured by Deep Security, go to Events & Reports > Events > Web Reputation Events.
What information is displayed for web reputation events?
These columns can be displayed on the web reputation events page. You can click Columns to select which columns are displayed in the table.
- Time: Time the event took place on the computer.
- Computer: The computer on which this event was logged. (If the computer has been removed, this entry will read "Unknown Computer".)
- URL: The URL that triggered this event.
- Tag(s): Event tags associated with this event.
- Risk: What was the risk level of the URL that triggered the event ("Suspicious", "Highly Suspicious", "Dangerous", "Untested", or "Blocked by Administrator").
- Rank: Rank provides a way to quantify the importance of events. It is calculated by multiplying the asset value of the computer by the severity of the rule. (See Rank events to quantify their importance.)
- Event Origin: Indicates from which part of the Deep Security system the event originated.
Add a URL to the list of allowed URLs
If you want to add the URL that triggered an event to the list of allowed URLs, right-click the event and select Add to Allow List. (To view or edit the Allowed and Blocked lists, go to the Exceptions tab on the main Web Reputation page.)