Flow Table Reporting

Navigate to Diagnostics > Flow Table Reporting to create a flow table report. These reports contain information on the traffic flows that passed through Threat Defender.

Click the GENERATE ANONYMIZED CORE FLOW TABLE REPORT button to create an anonymized flow table report that contains no IP addresses.
Click the GENERATE PLAIN CORE FLOW TABLE REPORT button to create a plain flow table report that includes IP addresses.

The table displays the latest flow table report with an automatically generated filename, the file size and its creation date.

Older flow table reports are overwritten when a new report is created.

With the button in the last table column, you can download the flow table report to your file system.


Additional References:

For further information on the content of flow table reports, see Flow Table Reports in the appendix.

results matching ""

    No results matching ""