Network
By default, network statistics are shown for the last hour. You can also see statistics for the last
day. Select the applicable option Last hour or Last day from the Network section's title bar.
The data is automatically refreshed for the time period:
Last hour - At one minute intervals. For example, if you generate a report at 10:15:45 AM, the
report represents data from 9:15 to 10:15 AM.
Last day - At hourly intervals. For example, if you generate a report at 10:15 AM, the report
represents data from the last 24 hours ending at 10:00 AM of the current day.
•
Bandwidth Usage - The doughnut chart shows the top 10 applications or users that consumed
the most bandwidth in the selected time frame (last hour or last day). Click the Applications or
Users links to toggle between the statistics. To show user information the User Awareness
blade must be activated.
Top Bandwidth Consuming - Shows statistics for the top bandwidth consuming application,
•
category, site, and user in percentages and the amount of traffic (MB or GB).
•
Traffic - By default, shows the total amount of traffic received and sent in an area graph. The
time axis reflects the time frame (last hour or last day) selected for the Network section. For
last hour, the graph shows 5 minute intervals and for last day, hourly intervals. You can click
the Received and Sent links to see only the amount of traffic received or sent. The orange area
on the graph represents sent traffic. The blue area represents received traffic.
If you hover over a time interval, a popup box shows:
•
The date and time
•
The traffic sent or received
•
The total traffic for that time interval
•
Total traffic statistics - Next to the area graph you can see total traffic statistics for the last day
or hour.
Security
•
Infected hosts - Shows the number of:
•
Infected hosts
•
Infected servers
•
Recently active infected hosts
You can click All Infected Hosts to open the Logs & Monitoring > Infected Hosts page.
High risk applications - Shows:
•
•
The number of high risk applications
•
The most used high risk applications
•
The top users of high risk applications.
You can click Applications Blade Control to open the Access Policy > Firewall Blade Control
page to see Applications and URL Filtering settings.
•
Security events - Shows the number of:
•
Anti-Bot - Malwares detected by the Security Gateway.
•
Anti-Virus - Malwares detected by the Security Gateway.
•
Threat Emulation - Malicious files found since the last reboot and how many files scanned.
•
The number of IPS attacks.
You can click the links to open the Threat Prevention > Blade Control page.
Check Point 1100/1200R/1400 Appliances Centrally Managed Administration Guide R77.20.70
Appliance Configuration
|
50
Need help?
Do you have a question about the CHECK POINT 1100 and is the answer not in the manual?