Netgear UTM5 User Manual Page 402

  • Download
  • Add to my manuals
  • Print
  • Page
    / 484
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 401
ProSecure Unified Threat Management (UTM) Appliance Reference Manual
11-40 Monitoring System Access and Performance
v1.0, January 2010
The following application incident are shown per day, both in tables and graphics:
Number of instant messaging application violations, top 10 violating instant
messaging applications by count, and top 10 violating instant messaging clients by
count
Number of peer-to-peer application violations, top 10 violating peer-to-peer
applications by count, and top 10 violating peer-to-peer clients by count
The following malware incident are shown per day, both in tables and graphics:
The number of SMPT, POP3, and IMAP incidents, the top 10 e-mail malware threats
by count, and the top 10 infected e-mail clients by count.
The number of HTTP, HTTPS, and FTP incidents, the top 10 Web malware threats by
count, and the top 10 infected Web clients by count.
The reports that you select are generated as both Microsoft Office Comma Separated Values
(CSV) and MHTML files. The CSV files do not contain headers for the tables nor graphics, but the
MHTML files contain both. You can download the reports as zipped files.
Generating Reports
To generate a report:
1. Select Monitoring > Logs & Reports from the menu. The Logs & Reports submenu tabs
appear, with the Email and Syslog screen in view.
2. Click the Generate Reports submenu tab. The Generate Reports screen displays (see
Table 11-24 on page 11-41).
Page view 401
1 2 ... 397 398 399 400 401 402 403 404 405 406 407 ... 483 484

Comments to this Manuals

No comments