Network Intrusion Detection Log

Log Information
Date/Time:
Log ID:
Reported By:
Location/Network:
Event Details
Timestamp Source IP Destination IP Source Port Destination Port Protocol Alert Type Severity Description
Action Taken
Mitigation Steps:
Responsible Personnel:
Notes: