6
Figure 44, IM Management menu (expended) ................................................................... 43
Figure 45, IM Login Notice - configuration ........................................................................ 44
Figure 46, IM Login Notice – MSN Example ....................................................................... 45
Figure 47, IM notice - NetBIOS example........................................................................... 45
Figure 48, IM notice – ICQ ............................................................................................. 46
Figure 49, IM Authentication Messages ............................................................................ 47
Figure 50, IM Authentication - Default Rules ..................................................................... 49
Figure 51, IM Authentication - Account Rules .................................................................... 51
Figure 52, P2P Management - Default Rule ....................................................................... 52
Figure 53, P2P Management - User Rule........................................................................... 53
Figure 54, General settings of capturing ........................................................................... 55
Figure 55, Example of the Record / Setting page ............................................................... 55
Figure 56, Default Character Encoding ............................................................................. 57
Figure 57, Captured data by user .................................................................................... 59
Figure 58, Customer view search by user ......................................................................... 60
Figure 59, Record / Service ............................................................................................ 61
Figure 60, Records Captured - SMTP................................................................................ 61
Figure 61, Records Captured - Forward ............................................................................ 62
Figure 62, Records Captured - SMTP Search ..................................................................... 62
Figure 63, Download the search result ............................................................................. 63
Figure 64, Records Captured - POP3/IMAP ........................................................................ 64
Figure 65, Records Captured - HTTP ................................................................................ 65
Figure 66, Records Captured - IM .................................................................................... 66
Figure 67, Records Captured - Web SMTP......................................................................... 67
Figure 68, Records Captured - Web POP3 ......................................................................... 68
Figure 69, Records Captured – FTP .................................................................................. 69
Figure 70, Records Captured - FTP, download a copy ......................................................... 69
Figure 71, Records Captured – Telnet Sessions ................................................................. 70
Figure 72, Telnet Session Details..................................................................................... 70
Figure 73, Flow Analysis - Menu ...................................................................................... 71
Figure 74, Flow Analysis - Today Top 10........................................................................... 72
Figure 75, Flow Analysis - Top N ..................................................................................... 74
Figure 76, Flow Analysis - Statistics Chart ........................................................................ 76
Figure 77, Anomaly flow IP menu .................................................................................... 77
Figure 78, Anomaly flow detect - general settings.............................................................. 78
Figure 79, Virus-infected IP ............................................................................................ 79
Figure 80, NetBIOS Notification Shown to the Victim User................................................... 79
Figure 81, Virus-infected IP Email alerts ........................................................................... 79
Figure 82, Example of Intrusion IP detection..................................................................... 80
Figure 83, Local Disk Menu............................................................................................. 81
Figure 84, Storage Time ................................................................................................ 82
Figure 85, Disk Space Usage .......................................................................................... 84
Figure 86, Disk Space Usage Report ................................................................................ 84
Figure 87, Disk space usage details (continued) ................................................................ 85
Summary of Contents for freeGuard Capture 1000
Page 4: ......
Page 8: ...4 EVENT LOG 102 14 TECHNICAL SUPPORT 103 Online Support 103 Telephone Support 103...
Page 12: ...8...
Page 19: ...freeGuard Capture Appliance User s Manual 15...
Page 50: ...46 Figure 48 IM notice ICQ...
Page 52: ...48 RADIUS POP3 LDAP...
Page 54: ...50...
Page 58: ...54 To move the two users to be the Drop accounts list just click the link says to Drop...
Page 86: ...82 Figure 84 Storage Time...
Page 95: ...freeGuard Capture Appliance User s Manual 91 Figure 93 Daily report sent by the email...
Page 96: ...92 Figure 94 Sample Report by Email Network Traffic...
Page 97: ...freeGuard Capture Appliance User s Manual 93...
Page 99: ...freeGuard Capture Appliance User s Manual 95 Figure 96 Report Sample Weekly Report...
Page 100: ...96 Figure 97 Report Sample Weekly Traffic Weekly report by user...
Page 102: ...98...
Page 104: ...100...