Web reputation events

For general best practices related to events, see About Deep Security event logging.

To see the web reputation events captured by Deep Security, go to Events & Reports > Events > Web Reputation Events.

What information is displayed for web reputation events?

These columns can be displayed on the web reputation events page. You can click Columns to select which columns are displayed in the table.

  • Time: Time the event took place on the computer.
  • Computer: The computer on which this event was logged. (If the computer has been removed, this entry will read "Unknown Computer".)
  • URL: The URL that triggered this event.
  • Tag(s): Event tags associated with this event.
  • Risk: What was the risk level of the URL that triggered the event ("Suspicious", "Highly Suspicious", "Dangerous", "Untested", or "Blocked by Administrator").
  • Rank: Rank provides a way to quantify the importance of events. It is calculated by multiplying the asset value of the computer by the severity of the rule. (See Rank events to quantify their importance.)
  • Event Origin: Indicates from which part of the Deep Security system the event originated.

Add a URL to the list of allowed URLs

If you want to add the URL that triggered an event to the list of allowed URLs, right-click the event and select Add to Allow List. (To view or edit the Allowed and Blocked lists, go to the Exceptions tab on the main Web Reputation page.)