Querying Logs And Generating Reports; Querying The Logs - NETGEAR UTM25-100NAS - Prosecure Utm Appliance 25U No Sub Included Reference Manual

Prosecure unified threat management
Table of Contents

Advertisement

ProSecure Unified Threat Management UTM10 or UTM25 Reference Manual
Figure 11-22

Querying Logs and Generating Reports

The extensive logging and reporting functions of the UTM let you perform the following tasks that
help you to monitor the protection of the network and the performance of the UTM:
Querying and downloading logs
Generating and downloading e-mail, Web, and system reports
Scheduling automatic e-mail, Web, and system reports, and e-mailing these reports to
specified recipients.
For information about e-mailing logs and sending logs to a syslog server, see
Activating System, E-mail, and Syslog Logs" on page

Querying the Logs

The UTM generates logs that provide detailed information about malware threats and traffic
activities on the network. You can view these logs through the Web Management Interface or save
the log records in CSV or HTML format and download them to a computer (the downloading
option is not available for all logs).
The UTM provides 13 types of logs:
Traffic Logs. All scanned incoming and outgoing traffic.
Spam Logs. All intercepted spam.
11-32
11-6.
Monitoring System Access and Performance
v1.0, September 2009
"Configuring and

Advertisement

Table of Contents
loading

This manual is also suitable for:

Prosecure utm10Prosecure utm25

Table of Contents