Network Intrusion Detection Log
Log Information
Date/Time:
Log ID:
Reported By:
Location/Network:
Event Details
Timestamp
Source IP
Destination IP
Source Port
Destination Port
Protocol
Alert Type
Severity
Description
Action Taken
Mitigation Steps:
Responsible Personnel:
Notes: