Flexible evaluation (user-related filtering according to any criteria) of log files from an Internet firewall for identifying and protecting against attacks from the Internet. The aim of the application is to use the flexible evaluation options offered by MS Access and to enhance them to make them more user-friendly (saving evaluation definitions).