ProSecure Unified Threat Management (UTM) Appliance

To set the poll interval:

1.Click the Stop button.

2.From the Poll Interval drop-down list, select a new interval. The minimum is 5 seconds; the maximum is 5 minutes.

3.Click the Set Interval button.

The following table explains the fields of the Total Threats, Threats (Counts), and Total Traffic (Bytes) sections of the Dashboard screen:

Table 119. Dashboard screen: threats and traffic information

Item

Description

 

 

 

Total Threats

 

 

 

 

Emails

Displays the total number of:

 

Scanned emails.

 

• Viruses (malware) detected. For information about how to configure these settings, see

 

 

Customize Email Antivirus and Notification Settings on page 196.

 

• Emails that matched filters. For information about how to configure these settings, see

 

 

Email Content Filtering on page 199.

 

• Spam. For information about how to configure these settings, see Protect Against Email

 

 

Spam on page 202.

 

• Quarantined emails, attachments, and objects. For information about how to configure

 

 

these settings, see Customize Email Antivirus and Notification Settings on page 196 and

 

 

Configure Distributed Spam Analysis on page 207.

 

 

Web

Displays the total number of:

 

Files scanned.

 

• Malware detected. For information about how to configure these settings, see Configure

 

 

Web Malware or Antivirus Scans on page 216.

 

• Files blocked. For information about how to configure these settings, see Configure Web

 

 

Content Filtering on page 218.

 

• URLs blocked. For information about how to configure these settings, see Configure Web

 

 

URL Filtering on page 224.

 

• Quarantined web files and objects. For information about how to configure these settings,

 

 

see Configure Web Malware or Antivirus Scans on page 216 and Configure FTP

 

 

Scanning on page 238.

 

 

Applications

Displays the total number of:

 

Applications blocked.

 

Applications logged.

 

For information about how to configure these settings, see Customize Web Protocol Scan

 

Settings on page 210.

 

 

Network

Displays the total number of:

 

• IPS attack signatures matched.

 

Anomaly behaviors detected.

 

For information about how to configure these settings, see Enable and Configure the Intrusion

 

Prevention System on page 187.

Monitor System Access and Performance

479

Page 479
Image 479
NETGEAR STM150EW-100NAS  To set the poll interval, Dashboard screen threats and traffic information, 479, Total Threats