NETGEAR UTM5EW-100NAS Appliance Reference Manual page 402

Unified threat management
Table of Contents

Advertisement

ProSecure Unified Threat Management (UTM) Appliance Reference Manual
The following application incident are shown per day, both in tables and graphics:
Number of instant messaging application violations, top 10 violating instant
messaging applications by count, and top 10 violating instant messaging clients by
count
Number of peer-to-peer application violations, top 10 violating peer-to-peer
applications by count, and top 10 violating peer-to-peer clients by count
The following malware incident are shown per day, both in tables and graphics:
The number of SMPT, POP3, and IMAP incidents, the top 10 e-mail malware threats
by count, and the top 10 infected e-mail clients by count.
The number of HTTP, HTTPS, and FTP incidents, the top 10 Web malware threats by
count, and the top 10 infected Web clients by count.
The reports that you select are generated as both Microsoft Office Comma Separated Values
(CSV) and MHTML files. The CSV files do not contain headers for the tables nor graphics, but the
MHTML files contain both. You can download the reports as zipped files.
Generating Reports
To generate a report:
1. Select Monitoring > Logs & Reports from the menu. The Logs & Reports submenu tabs
appear, with the Email and Syslog screen in view.
2. Click the Generate Reports submenu tab. The Generate Reports screen displays (see
Table 11-24 on page
11-40
11-41).
v1.0, January 2010
Monitoring System Access and Performance

Advertisement

Table of Contents
loading

This manual is also suitable for:

Prosecure

Table of Contents