![NETGEAR ProSecure Скачать руководство пользователя страница 380](http://html1.mh-extra.com/html/netgear/prosecure/prosecure_appliance-reference-manual_1672217380.webp)
ProSecure Unified Threat Management (UTM) Appliance Reference Manual
11-18
Monitoring System Access and Performance
v1.0, January 2010
Table 11-7
explains the fields of the Most Recent 5 and Top 5 sections of the Dashboard screen.
Table 11-7. Dashboard: Most Recent 5 and Top 5 Information
Category
Most Recent 5 Description
Top 5 Description
Threats
•
Malware Name
. The name of the
malware threat.
•
Protocol
. The protocol in which the
malware threat was detected.
•
Date and Time
. The date and time that
the malware threat was detected.
•
Malware Name
. The name of the
malware threat.
•
Count
. The number of times that the
malware threat was detected.
•
Percentage
. The percentage that the
malware threat represents in relation to
the total number of detected malware
threats.
IPS Signatures
•
Signature Name
. The name of the attack.
•
Category
. The category in which the
attack was detected, such as Web, Mail,
Databases, and so on.
Note
: For more information about
categories, see
“Using the Intrusion
Prevention System” on page 5-49
.
•
Date and Time
. The date and time that
the attack was detected.
•
Signature Name
. The name of the attack.
•
Count
. The number of times that the
attack was detected.
•
Percentage
. The percentage that the
attack represents in relation to the total
number of detected attacks.
IM/Peer to Peer
•
Application
. The name of the application
that was blocked.
•
Category
. Instant messaging or peer-to-
peer.
•
Date and Time
. The date and time that
the application request was blocked.
•
Application
. The name of the application
that was blocked.
•
Requests
. The total number of user
requests for the blocked application.
•
Source IPs
. The source IP address from
which the request came.
Web Categories •
Category
. The Web category that was
blocked.
Note
: For more information about Web
categories, see
“Configuring Web Content
Filtering” on page 6-23
.
•
Date and Time
. The date and time that
the Web request was blocked.
•
Category
. The Web category that was
blocked.
Note
: For more information about Web
categories, see
“Configuring Web Content
Filtering” on page 6-23
.
•
Requests
. The total number of user
requests for the blocked Web category.
•
Source IPs
. The source IP address from
which the request came.
Spam
•
Email Subject
. The e-mail subject line in
the spam message.
•
Date and Time
. The date and time that
the spam message was detected.
•
Recipient
. The intended recipient of the
spam message.
•
Emails
. The number of spam messages
for the intended recipient.
Содержание ProSecure
Страница 6: ...v1 0 January 2010 vi ...
Страница 16: ...ProSecure Unified Threat Management UTM Appliance Reference Manual xvi v1 0 January 2010 ...
Страница 34: ...ProSecure Unified Threat Management UTM Appliance Reference Manual 1 16 Introduction v1 0 January 2010 ...
Страница 114: ...ProSecure Unified Threat Management UTM Appliance Reference Manual 4 28 LAN Configuration v1 0 January 2010 ...
Страница 468: ...ProSecure Unified Threat Management UTM Appliance Reference Manual E 2 Related Documents v1 0 January 2010 ...