ProSecure Unified Threat Management (UTM) Appliance Reference Manual

Table 11-7explains the fields of the Most Recent 5 and Top 5 sections of the Dashboard screen.

Table 11-7. Dashboard: Most Recent 5 and Top 5 Information

Category

Most Recent 5 Description

Top 5 Description

 

 

 

Threats

Malware Name. The name of the

Malware Name. The name of the

 

malware threat.

malware threat.

 

Protocol. The protocol in which the

Count. The number of times that the

 

malware threat was detected.

malware threat was detected.

 

Date and Time. The date and time that

Percentage. The percentage that the

 

the malware threat was detected.

malware threat represents in relation to

 

 

the total number of detected malware

 

 

threats.

 

 

 

IPS Signatures

Signature Name. The name of the attack.

Signature Name. The name of the attack.

 

Category. The category in which the

Count. The number of times that the

 

attack was detected, such as Web, Mail,

attack was detected.

 

Databases, and so on.

Percentage. The percentage that the

 

Note: For more information about

attack represents in relation to the total

 

categories, see “Using the Intrusion

number of detected attacks.

 

Prevention System” on page 5-49.

 

 

Date and Time. The date and time that

 

 

the attack was detected.

 

 

 

 

IM/Peer to Peer

Application. The name of the application

Application. The name of the application

 

that was blocked.

that was blocked.

 

Category. Instant messaging or peer-to-

Requests. The total number of user

 

peer.

requests for the blocked application.

 

Date and Time. The date and time that

Source IPs. The source IP address from

 

the application request was blocked.

which the request came.

 

 

 

Web Categories

Category. The Web category that was

Category. The Web category that was

 

blocked.

blocked.

 

Note: For more information about Web

Note: For more information about Web

 

categories, see “Configuring Web Content

categories, see “Configuring Web Content

 

Filtering” on page 6-23.

Filtering” on page 6-23.

 

Date and Time. The date and time that

Requests. The total number of user

 

the Web request was blocked.

requests for the blocked Web category.

 

 

Source IPs. The source IP address from

 

 

which the request came.

Spam

Email Subject. The e-mail subject line in

Recipient. The intended recipient of the

 

the spam message.

spam message.

 

Date and Time. The date and time that

Emails. The number of spam messages

 

the spam message was detected.

for the intended recipient.

 

 

 

11-18

Monitoring System Access and Performance

v1.0, January 2010

Page 380
Image 380
NETGEAR UTM50-100NAS Dashboard Most Recent 5 and Top 5 Information, Category Most Recent 5 Description Top 5 Description