NETGEAR UTM5 Reference Manual page 453

Prosecure unified threat management appliance
Hide thumbs Also See for UTM5:
Table of Contents

Advertisement

ProSecure Unified Threat Management (UTM) Appliance
The following table explains the fields of the Most Recent 5 and Top 5 sections of the
Dashboard screen:
Table 114. Dashboard screen: most recent 5 threats and top 5 threats information
Category
Most recent 5 threats description
Threats
Malware Name. The name of the
malware threat.
Protocol. The protocol in which the
malware threat was detected.
Date and Time. The date and time that
the malware threat was detected.
IPS Signatures
Signature Name. The name of the
attack.
Category. The category in which the
attack was detected, such as Web,
Mail, Databases, and so on. (For more
information about categories, see
the Intrusion Prevention System
page 178.)
Date and Time. The date and time that
the attack was detected.
Applications
Application. The name of the
application that was blocked.
Category. Instant messaging or
peer-to-peer.
Date and Time. The date and time that
the application request was blocked.
Web Categories
Category. The web category that was
blocked. (For more information about
web categories, see
Content Filtering
Date and Time. The date and time that
the web request was blocked.
Spam
Email Subject. The email subject line
in the spam message.
Date and Time. The date and time that
the spam message was detected.
Configure Web
on page 204.)
Monitoring System Access and Performance
453
Top 5 threats description
Malware Name. The name of the
malware threat.
Count. The number of times that the
malware threat was detected.
Percentage. The percentage that the
malware threat represents in relation to
the total number of detected malware
threats.
Signature Name. The name of the
attack.
Count. The number of times that the
attack was detected.
Use
Percentage. The percentage that the
on
attack represents in relation to the total
number of detected attacks.
Application. The name of the
application that was blocked.
Requests. The total number of user
requests for the blocked application.
Source IPs. The source IP address
from which the request came.
Category. The web category that was
blocked. (For more information about
web categories, see
Content Filtering
Requests. The total number of user
requests for the blocked web category.
Source IPs. The source IP address
from which the request came.
Recipient. The intended recipient of the
spam message.
Emails. The number of spam
messages for the intended recipient.
Configure Web
on page 204.)

Advertisement

Table of Contents
loading

This manual is also suitable for:

Utm9sUtm10Utm150Utm25Utm50

Table of Contents