ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual
x
v1.0, September 2009
Creating and Deleting Groups by Name ..................................................................5-3
Editing Groups by Name .............. ................ ... ... .... ................ ... ... .... ................ ... ... ..5-4
Creating and Deleting Groups by IP Address and Subnet ........................ ... .... ... ... ..5-5
Configuring User Accounts .............................................................................................5-6
Creating and Deleting User Accounts ......................................................................5-6
Editing User Accounts ..............................................................................................5-8
Configuring Authentication .............................................................................................5-9
Understanding Active Directories and LDAP Configurations .................................5-12
Creating and Deleting LDAP and Active Directory Domains .. ... ... ....... ... ... ... .... ... ...5-16
Editing LDAP and Active Directory Domains ...................... ... ... ... .... ................ ... ...5-19
Creating and Deleting RADIUS Domains ..... ... ... ....... ... ..........................................5-19
Editing RADIUS Domains and Configuring VLANs ................................................ 5-22
Global User Settings ........... ... ... ... ................. ... ... ... ................ .... ... ... ................ ... .... ... ...5-24
Viewing and Logging Out Active Users ........................................................................5-25
Chapter 6
Monitoring System Access and Performance
Configuring Logging, Alerts, and Event Notifications .....................................................6-1
Configuring the E-mail Notification Server ...............................................................6-2
Configuring and Activating System, E-mail, and Syslog Logs .................................6-3
Configuring Alerts .....................................................................................................6-8
Monitoring Real-Time Traffic, Security, Statistics, and Web Usage ..............................6-11
Understanding the Information on the Dashboard Screen .....................................6-11
Monitoring Web Usage ....... ................ .... ... ... ................ ... .... ... ................ ... ... .... ......6-18
Viewing System Status .................................................................................................6-19
Querying Logs and Generating Reports .......................................................................6-22
Querying the Logs ..................................................................................................6-22
Scheduling and Generating Reports ......................................................................6-28
Viewing and Managing the Quarantine Files ................................................................6-33
Using Diagnostics Utilities ............................................................................................6-40
Using the Network Diagnostic Tools .......................................................................6-41
Using the Realtime Traffic Diagnostics Tool ........................................................... 6-42
Gathering Important Log Information and Generating a Network Statistics Report 6-43
Restarting and Shutting Down the STM .............................. ... ... ... .... ... ... ...... .... ... ...6-44