Can the IG200/IG2000 identify the originator of an intrusion or attack?
Yes. The Source Tracking feature captures the source address of an offending non-spoofed attacker and can block all further transmission attempts pending administrator intervention. The offending address is reported in the events log and an email can be automatically generated and sent to the offender’s domain administrator.