Netgear UTM5 User Manual Page 394

  • Download
  • Add to my manuals
  • Print
  • Page
    / 484
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 393
ProSecure Unified Threat Management (UTM) Appliance Reference Manual
11-32 Monitoring System Access and Performance
v1.0, January 2010
Querying Logs and Generating Reports
The extensive logging and reporting functions of the UTM let you perform the following tasks that
help you to monitor the protection of the network and the performance of the UTM:
Querying and downloading logs
Generating and downloading e-mail, Web, and system reports
Scheduling automatic e-mail, Web, and system reports, and e-mailing these reports to
specified recipients.
For information about e-mailing logs and sending logs to a syslog server, see “Configuring and
Activating System, E-mail, and Syslog Logs” on page 11-6.
Querying the Logs
The UTM generates logs that provide detailed information about malware threats and traffic
activities on the network. You can view these logs through the Web Management Interface or save
the log records in CSV or HTML format and download them to a computer (the downloading
option is not available for all logs).
The UTM provides 13 types of logs:
Traffic Logs. All scanned incoming and outgoing traffic.
Spam Logs. All intercepted spam.
Figure 11-22
Page view 393
1 2 ... 389 390 391 392 393 394 395 396 397 398 399 ... 483 484

Comments to this Manuals

No comments