NETGEAR STM150 Reference Manual page 9

Prosecure web/email threat manager
Hide thumbs Also See for STM150:
Table of Contents

Advertisement

Configuring Web Malware Scans ...........................................................................4-13
Configuring Web Content Filtering .........................................................................4-14
Configuring Web URL Filtering ..............................................................................4-17
HTTPS Scan Settings ............................................................................................4-19
The STM150 CA Certificate ...................................................................................4-20
Certificate Management .........................................................................................4-22
Trusted Hosts .........................................................................................................4-23
Configuring FTP Scan ..................................................................................................4-25
Chapter 5
Viewing the System Status .............................................................................................5-2
Using Statistics and Web Usage Data ............................................................................5-3
Monitoring Security .........................................................................................................5-5
Running Diagnostics .......................................................................................................5-6
Using the Network Diagnostic Tools .........................................................................5-6
Using the Realtime Traffic Diagnostic Tools .............................................................5-7
Gathering Important Log Information .......................................................................5-7
To collect information about your the STM150 .........................................................5-7
Generate Network Statistics Report .........................................................................5-8
Using Reports to Optimize Protection and Performance ................................................5-8
Working with Logs ....................................................................................................5-8
Working with Reports ............................................................................................. 5-11
Using Online Support ...................................................................................................5-12
Enabling Remote Troubleshooting .........................................................................5-12
Working with Hot Fixes ..........................................................................................5-13
Sending Suspicious Files to NETGEAR for Analysis .............................................5-14
Appendix A
ProSecure Web/Email Threat Manager STM150 Reference Manual
v1.0, January 2009
ix

Advertisement

Table of Contents
loading

Table of Contents