NETGEAR UTM5EW-100NAS Appliance Reference Manual page 380

Unified threat management
Table of Contents

Advertisement

ProSecure Unified Threat Management (UTM) Appliance Reference Manual
Table 11-7
explains the fields of the Most Recent 5 and Top 5 sections of the Dashboard screen.
Table 11-7. Dashboard: Most Recent 5 and Top 5 Information
Category
Most Recent 5 Description
Threats
• Malware Name. The name of the
malware threat.
• Protocol. The protocol in which the
malware threat was detected.
• Date and Time. The date and time that
the malware threat was detected.
IPS Signatures
• Signature Name. The name of the attack.
• Category. The category in which the
attack was detected, such as Web, Mail,
Databases, and so on.
Note: For more information about
categories, see
Prevention System" on page
• Date and Time. The date and time that
the attack was detected.
IM/Peer to Peer • Application. The name of the application
that was blocked.
• Category. Instant messaging or peer-to-
peer.
• Date and Time. The date and time that
the application request was blocked.
Web Categories • Category. The Web category that was
blocked.
Note: For more information about Web
categories, see
Filtering" on page
• Date and Time. The date and time that
the Web request was blocked.
Spam
• Email Subject. The e-mail subject line in
the spam message.
• Date and Time. The date and time that
the spam message was detected.
11-18
"Using the Intrusion
5-49.
"Configuring Web Content
6-23.
Monitoring System Access and Performance
v1.0, January 2010
Top 5 Description
• Malware Name. The name of the
malware threat.
• Count. The number of times that the
malware threat was detected.
• Percentage. The percentage that the
malware threat represents in relation to
the total number of detected malware
threats.
• Signature Name. The name of the attack.
• Count. The number of times that the
attack was detected.
• Percentage. The percentage that the
attack represents in relation to the total
number of detected attacks.
• Application. The name of the application
that was blocked.
• Requests. The total number of user
requests for the blocked application.
• Source IPs. The source IP address from
which the request came.
• Category. The Web category that was
blocked.
Note: For more information about Web
categories, see
"Configuring Web Content
Filtering" on page
6-23.
• Requests. The total number of user
requests for the blocked Web category.
• Source IPs. The source IP address from
which the request came.
• Recipient. The intended recipient of the
spam message.
• Emails. The number of spam messages
for the intended recipient.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Prosecure

Table of Contents