NETGEAR UTM5 Reference Manual page 499

Prosecure unified threat management appliance
Hide thumbs Also See for UTM5:
Table of Contents

Advertisement

ProSecure Unified Threat Management (UTM) Appliance
Table 131. Report screen: report template information (continued)
Report template
Top n Applications by
Bandwidth
Top n Users by Bandwidth
Applications Bandwidth
Usage by Time
Users Bandwidth Usage by
Time
Email Activity
Malware Incidents By Time
Email Filter By Time
Spams By Time
Requests By Time
Traffic By Time
Monitoring System Access and Performance
Information reported for the specified time range
A chart and a table with the applications for which most bandwidth was
consumed and the size of the bandwidth consumed (expressed in bytes),
and drill-down links to the users who accessed the applications.
When you click the drill-down link for a user, the Applications Bandwidth by
User chart and table display, showing the users who consumed most
bandwidth for the application. For each user, the user login name (including
the domain to which the user belongs) and the size of the bandwidth
consumed (expressed in bytes) are shown.
A chart and a table with the users who consumed most bandwidth and the
size of the bandwidth consumed (expressed in bytes), and drill-down links to
the applications for which most bandwidth was consumed.
When you click the drill-down link for an application, the User Bandwidth by
Applications chart and table display, showing the applications for which the
user consumed most bandwidth. For each application, the size of the
bandwidth consumed (expressed in bytes) is shown.
A chart and a table with the bandwidth usage (expressed in bytes) and the
numbers of applications for which bandwidth was consumed, and drill-down
links to the applications for which bandwidth was consumed.
When you click the drill-down link for the applications, the Applications
Bandwidth Usage chart and table display, showing the individual
applications for which most bandwidth was consumed. For each application,
the size of the bandwidth consumed (expressed in bytes) is shown.
A chart and a table with the bandwidth usage (expressed in bytes) and the
numbers of users who consumed bandwidth, and drill-down links to the
users who consumed bandwidth.
When you click the drill-down link for the users, the User Bandwidth Usage
chart and table display, showing the individual users who consumed most
bandwidth. For each user, the size of the bandwidth consumed (expressed
in bytes) is shown.
For each of the three email server protocols separately, a chart and a table
with the number of detected malware incidents.
For each of the three email server protocols separately, a chart and a table
with the number of filtered (blocked) files (attachments).
For the POP3 and SMTP protocols separately, a chart and a table with the
number of spam emails that are detected by distributed spam analysis.
For each of the three email server protocols separately, a chart and a table
with the number of processed emails.
For each of the three email server protocols separately, a chart and a table
with the processed traffic, expressed in bytes.
499

Advertisement

Table of Contents
loading

This manual is also suitable for:

Utm9sUtm10Utm150Utm25Utm50

Table of Contents