ProSecure Unified Threat Management (UTM) Appliance

The following table explains the fields of the Most Recent 5 and Top 5 sections of the Dashboard screen:

Table 120. Dashboard screen: most recent 5 threats and top 5 threats information

Category

Most recent 5 threats description

Top 5 threats description

 

 

 

Threats

Malware Name. The name of the

Malware Name. The name of the

 

malware threat.

 

malware threat.

Count. The number of times that the

 

Protocol. The protocol in which the

malware threat was detected.

 

malware threat was detected.

Percentage. The percentage that the

 

Date and Time. The date and time that

malware threat represents in relation to

 

the malware threat was detected.

the total number of detected malware

 

 

threats.

 

 

 

IPS Signatures

Signature Name. The name of the

 

 

attack.

Signature Name. The name of the

 

Category. The category in which the

 

attack.

 

attack was detected, such as Web,

 

Count. The number of times that the

 

Mail, Databases, and so on. (For more

 

information about categories, see

attack was detected.

 

Percentage. The percentage that the

 

Enable and Configure the Intrusion

 

attack represents in relation to the total

 

Prevention System on page 187.)

 

number of detected attacks.

 

Date and Time. The date and time that

 

 

 

the attack was detected.

 

 

 

 

Applications

Application. The name of the

Application. The name of the

 

application that was blocked.

application that was blocked.

 

Category. Instant messaging or

Requests. The total number of user

 

peer-to-peer.

requests for the blocked application.

 

Date and Time. The date and time that

Source IPs. The source IP address

 

the application request was blocked.

from which the request came.

Web Categories

 

Category. The web category that was

 

Category. The web category that was

blocked. (For more information about

 

blocked. (For more information about

web categories, see Configure Web

 

web categories, see Configure Web

Content Filtering on page 218.)

 

Content Filtering on page 218.)

Requests. The total number of user

 

Date and Time. The date and time that

requests for the blocked web category.

 

the web request was blocked.

Source IPs. The source IP address

 

 

from which the request came.

Spam

Email Subject. The email subject line

Recipient. The intended recipient of the

 

in the spam message.

spam message.

 

Date and Time. The date and time that

Emails. The number of spam

 

the spam message was detected.

messages for the intended recipient.

Monitor System Access and Performance

481

Page 481
Image 481
NETGEAR STM150EW-100NAS, UTM5EW-100NAS manual 481, Enable and Configure the Intrusion