The Search Engine report displays details of web searches made from host computers with these search engines:
This report is available when log messages with data for this report exist in the specified time frame. To make sure that your Firebox sends log messages required to generate this report, follow the steps to Enable Logging for this Report.
How to Use this Report
This report can help you to identify any searches performed by your users for inappropriate or unsafe content. For example, you could review the search query data and identify users who search for terms related to violence or drug use.
View the Report
This report is available in WatchGuard Cloud only.
- Log in to WatchGuard Cloud.
- Select Monitor > Fireboxes.
The Device Manager page appears.
- From the Device Manager list, select a folder or a specific device.
- To select the report date range, click the Calendar .
- From the list of reports, select Detail > Search Engine.
The Search Engine report appears.
You can use pivots to change the view of the data on the report.
To switch to a different view, select a pivot from the drop-down list above the report.
This report includes these pivots:
Shows search data organized by the authenticated user who made the search.
Shows search data organized by the host computer the search originated from.
The Search Engine report is only available as a Detail report.
The Search Engine Detail report includes a row for each search made with the supported search engines and includes this detail:
|Event Time||Date and time of the search.|
|Authenticated User||Name of the user who performed the search. If authentication is not enabled on the device, None appears in this column.|
|Host||IP address of the host computer the search originated from.|
|Search Engine||URL of the search engine.|
To collect the data required for this report:
- In the HTTPS proxy action that the HTTPS proxy uses, enable content inspection for the search engines you want to include on the report. Ensure that the certificate the Firebox uses to re-encrypt content is installed on all host computers. For more information, see HTTPS-Proxy: Content Inspection.
- In the General Settings of the HTTP proxy action that is used to inspect content, select the Enable Logging for Reports check box.