ProSecure Unified Threat Management UTM10 or UTM25 Reference Manual

The following application incident are shown per day, both in tables and graphics:

Number of instant messaging application violations, top 10 violating instant messaging applications by count, and top 10 violating instant messaging clients by count

Number of peer-to-peer application violations, top 10 violating peer-to-peer applications by count, and top 10 violating peer-to-peer clients by count

The following malware incident are shown per day, both in tables and graphics:

The number of SMPT, POP3, and IMAP incidents, the top 10 e-mail malware threats by count, and the top 10 infected e-mail clients by count.

The number of HTTP, HTTPS, and FTP incidents, the top 10 Web malware threats by count, and the top 10 infected Web clients by count.

The reports that you select are generated as both Microsoft Office Comma Separated Values (CSV) and MHTML files. The CSV files do not contain headers for the tables nor graphics, but the MHTML files contain both. You can download the reports as zipped files.

Generating Reports

To generate a report:

1.Select Monitoring > Logs & Reports from the menu. The Logs & Reports submenu tabs appear, with the Email and Syslog screen in view.

2.Click the Generate Reports submenu tab. The Generate Reports screen displays (see Table 11-24 on page 11-41).

11-40

Monitoring System Access and Performance

v1.0, September 2009

Page 398
Image 398
NETGEAR UTM25EW-100NAS, UTM25-100NAS, UTM10EW-100NAS manual Generating Reports