Is it possible to perform a wildcard search on logs within Security Director web console (Monitor > Events & Logs > All events)?
i.e. if a full IP address is not known but the starting prefix is, for example; source ip address starts 192.168.x.x
Referenced doc does not seem to identify any facility for pattern matching
For ref this is: Security Directory 19.1R1
Any help much appreciated,