ProSecure Unified Threat Management (UTM) Appliance
The following table explains the fields of the Most Recent 5 and Top 5 sections of the
Dashboard screen:
Table 114. Dashboard screen: most recent 5 threats and top 5 threats information
Category
Most recent 5 threats description
Threats
•
Malware Name. The name of the
malware threat.
•
Protocol. The protocol in which the
malware threat was detected.
•
Date and Time. The date and time that
the malware threat was detected.
IPS Signatures
•
Signature Name. The name of the
attack.
•
Category. The category in which the
attack was detected, such as Web,
Mail, Databases, and so on. (For more
information about categories, see
the Intrusion Prevention System
page 178.)
•
Date and Time. The date and time that
the attack was detected.
Applications
•
Application. The name of the
application that was blocked.
•
Category. Instant messaging or
peer-to-peer.
•
Date and Time. The date and time that
the application request was blocked.
Web Categories
•
Category. The web category that was
blocked. (For more information about
web categories, see
Content Filtering
•
Date and Time. The date and time that
the web request was blocked.
Spam
•
Email Subject. The email subject line
in the spam message.
•
Date and Time. The date and time that
the spam message was detected.
Configure Web
on page 204.)
Monitoring System Access and Performance
453
Top 5 threats description
•
Malware Name. The name of the
malware threat.
•
Count. The number of times that the
malware threat was detected.
•
Percentage. The percentage that the
malware threat represents in relation to
the total number of detected malware
threats.
•
Signature Name. The name of the
attack.
•
Count. The number of times that the
attack was detected.
Use
•
Percentage. The percentage that the
on
attack represents in relation to the total
number of detected attacks.
•
Application. The name of the
application that was blocked.
•
Requests. The total number of user
requests for the blocked application.
•
Source IPs. The source IP address
from which the request came.
•
Category. The web category that was
blocked. (For more information about
web categories, see
Content Filtering
•
Requests. The total number of user
requests for the blocked web category.
•
Source IPs. The source IP address
from which the request came.
•
Recipient. The intended recipient of the
spam message.
•
Emails. The number of spam
messages for the intended recipient.
Configure Web
on page 204.)