Appliance Configuration
Check Point 1400 Appliances Centrally Managed Administration Guide R77.20.85 | 54
The report includes these sections:
•
Executive Summary
•
Table of Contents
•
Report Pages
Executive Summary
The first page of the report is the executive summary and shows:
•
The number of Anti-Bot, Anti-Virus, and Threat Emulation malware detected by the Security
Gateway and the number of IPS attacks.
•
Top bandwidth consuming statistics by category, site, and user. You can click the
Top category
,
Top site
, or
Top user
link to get to the applicable report page. It also shows
Bandwidth Usage
by Applications
statistics for the top 5 applications in a doughnut chart and total traffic
received and sent.
•
The number of infected devices, servers, and recently active infected devices.
•
The number of high risk applications, the most used high risk applications, and the top users
of high risk applications.
•
The Security Gateway name, version, and MAC address.
Table of Contents
The table of contents contains links to the network analysis, security analysis, and infected
devices reports. Click a link to go directly to the selected section.
Report Pages
Each report page shows a detailed graph, table, and descriptions.
Note
- This page is available from the
Home
and
Logs & Monitoring
tabs.
Using System Tools
On the
Tools
page you can:
•
Monitor system resources.
•
Show the routing table.
•
Verify the appliance connectivity to Cloud Services.
•
Display DSL Statistics (DSL models only)
•
Generate a CPInfo file.
•
Ping or trace an IP address.
•
Perform a DNS lookup.
•
Capture packets.
•
Download the console-USB driver
Содержание L-71
Страница 122: ......