NETGEAR UTM5 Reference Manual page 451

Prosecure unified threat management appliance
Hide thumbs Also See for UTM5:
Table of Contents

Advertisement

To set the poll interval:
1.
Click the Stop button.
2.
From the Poll Interval drop-down list, select a new interval. The minimum is 5 seconds; the
maximum is 5 minutes.
3.
Click the Set Interval button.
The following table explains the fields of the Total Threats, Threats (Counts), and Total Traffic
(Bytes) sections of the Dashboard screen:
Table 113. Dashboard screen: threats and traffic information
Item
Description
Total Threats
Emails
Displays the total number of:
Web
Displays the total number of:
Applications
Displays the total number of:
For information about how to configure these settings, see
Settings
Network
Displays the total number of:
For information about how to configure these settings, see
System
ProSecure Unified Threat Management (UTM) Appliance
Scanned emails.
Viruses (malware) detected. For information about how to configure these settings, see
Customize Email Antivirus and Notification Settings
Emails that matched filters. For information about how to configure these settings, see
Email Content Filtering
on page 190.
Spam. For information about how to configure these settings, see
Spam
on page 193.
Quarantined emails, attachments, and objects. For information about how to configure
these settings, see
Customize Email Antivirus and Notification Settings
Configure Distributed Spam Analysis
Files scanned.
Malware detected. For information about how to configure these settings, see
Web Malware Scans
on page 202.
Files blocked. For information about how to configure these settings, see
Content Filtering
on page 204.
URLs blocked. For information about how to configure these settings, see
URL Filtering
on page 211.
Quarantined web files and objects. For information about how to configure these settings,
see
Configure Web Malware Scans
page 224.
Applications blocked.
Applications logged.
on page 201.
IPS attack signatures matched.
Anomaly behaviors detected.
on page 178.
Monitoring System Access and Performance
on page 186.
on page 198.
on page 202 and
Configure FTP Scanning
Customize Web Protocol Scan
Use the Intrusion Prevention
451
Protect Against Email
on page 186 and
Configure
Configure Web
Configure Web
on

Advertisement

Table of Contents
loading

This manual is also suitable for:

Utm9sUtm10Utm150Utm25Utm50

Table of Contents