Schedule, Email, And Manage Reports - NETGEAR UTM9S Reference Manual

Prosecure unified threat management (utm) appliance
Hide thumbs Also See for UTM9S:
Table of Contents

Advertisement

Table 126. Report screen: report template information (continued)
Report template
File Blocked By Time
Spams By Time
Requests By Time
Traffic By Time
Blacklist By Time
System
Total Bandwidth Usage By
Time
Top n User By Bandwidth
Total Malware Incidents By
Time
Top n Malwares
Top n Infected Clients
CPU & Mem Usage

Schedule, Email, and Manage Reports

To schedule automatic generation and emailing of reports:
1.
Select Monitoring > Logs & Reports > Report. The Report screen displays. (The
following two figures show only the Schedule Reports and Report History sections of the
Report screen.)
ProSecure Unified Threat Management (UTM) Appliance
Information reported for the specified time range
For each of the three email server protocols separately, a chart and a table with
the number of blocked files (attachments).
For the POP3 and SMTP protocols separately, a chart and a table with the
number of spam emails that are detected by distributed spam analysis.
For each of the three email server protocols separately, a chart and a table with
the number of processed emails.
For each of the three email server protocols separately, a chart and a table with
the processed traffic, expressed in bytes.
For the POP3 and SMTP protocols separately, a chart and a table with the
number of blocked emails from email addresses that are on the blacklist, and for
the SMTP protocol only, a chart and a table with the number of blocked emails
from email addresses that are on the real-time blacklist (RBL).
A chart and a table with the consumed bandwidth, expressed in bytes.
A chart and a table with the IP addresses that consume most bandwidth,
expressed in bytes.
For email and web traffic separately, a chart and a table with the number of
detected malware incidents.
For email and web traffic separately, a chart and a table with the names of the
malware that were detected most often, including the number of times that they
were detected.
For email and web clients separately, a chart and a table with the IP addresses of
the clients that were infected by malware most often, including the number of
times that they were infected.
For the UTM's CPU and memory separately, a chart and a table with the usage,
expressed in percentage.
Monitoring System Access and Performance
480

Advertisement

Table of Contents
loading

Table of Contents