Firewall Threat logs record all threats the
firewall detects based on threat signatures (
Set
Up Antivirus, Anti-Spyware, and Vulnerability Protection)
and the ACC displays an overview of the top threats on your network.
Each event the firewall records includes an ID that identifies the
associated threat signature.
You can use the threat ID found
with a Threat log or ACC entry to:
If a signature has been
disabled, the signature UTID might be reused for a new signature.
Review
the content update release notes for notifications regarding new
and disabled signatures. Signatures might disabled in cases where:
the activity the signature detects has fallen out of use by attackers,
the signature generated significant false positives, or the signature
was consolidated with other like signatures into a single signature
(signature optimization).