ProSecure Unified Threat Management (UTM) Appliance

Table 137. Report screen: report template information (continued)

Report template

Information reported for the specified time range

 

 

Top n Applications by

A chart and a table with the applications for which most bandwidth was

Bandwidth

consumed and the size of the bandwidth consumed (expressed in bytes),

 

and drill-down links to the users who accessed the applications.

 

When you click the drill-down link for a user, the Applications Bandwidth by

 

User chart and table display, showing the users who consumed most

 

bandwidth for the application. For each user, the user login name (including

 

the domain to which the user belongs) and the size of the bandwidth

 

consumed (expressed in bytes) are shown.

 

 

Top n Users by Bandwidth

A chart and a table with the users who consumed most bandwidth and the

 

size of the bandwidth consumed (expressed in bytes), and drill-down links to

 

the applications for which most bandwidth was consumed.

 

When you click the drill-down link for an application, the User Bandwidth by

 

Applications chart and table display, showing the applications for which the

 

user consumed most bandwidth. For each application, the size of the

 

bandwidth consumed (expressed in bytes) is shown.

 

 

Applications Bandwidth

A chart and a table with the bandwidth usage (expressed in bytes) and the

Usage by Time

numbers of applications for which bandwidth was consumed, and drill-down

 

links to the applications for which bandwidth was consumed.

 

When you click the drill-down link for the applications, the Applications

 

Bandwidth Usage chart and table display, showing the individual

 

applications for which most bandwidth was consumed. For each application,

 

the size of the bandwidth consumed (expressed in bytes) is shown.

Users Bandwidth Usage by

A chart and a table with the bandwidth usage (expressed in bytes) and the

Time

numbers of users who consumed bandwidth, and drill-down links to the

 

users who consumed bandwidth.

 

When you click the drill-down link for the users, the User Bandwidth Usage

 

chart and table display, showing the individual users who consumed most

 

bandwidth. For each user, the size of the bandwidth consumed (expressed

 

in bytes) is shown.

 

 

Email Activity

 

 

 

Malware Incidents By Time

For each of the three email server protocols separately, a chart and a table

 

with the number of detected malware incidents.

 

 

Email Filter By Time

For each of the three email server protocols separately, a chart and a table

 

with the number of filtered (blocked) files (attachments).

 

 

Spams By Time

For the POP3 and SMTP protocols separately, a chart and a table with the

 

number of spam emails that are detected by distributed spam analysis.

Requests By Time

For each of the three email server protocols separately, a chart and a table

 

with the number of processed emails.

 

 

Traffic By Time

For each of the three email server protocols separately, a chart and a table

 

with the processed traffic, expressed in bytes.

 

 

Monitor System Access and Performance

528

Page 528
Image 528
NETGEAR UTM5EW-100NAS, STM150EW-100NAS manual 528, Email Activity