Netgear UTM25S Reference Manual 3.0.1-124 - Page 481
Table 120., Dashboard screen: most recent 5 threats and top 5 threats information
View all Netgear UTM25S manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 481 highlights
ProSecure Unified Threat Management (UTM) Appliance The following table explains the fields of the Most Recent 5 and Top 5 sections of the Dashboard screen: Table 120. Dashboard screen: most recent 5 threats and top 5 threats information Category Most recent 5 threats description Top 5 threats description Threats • Malware Name. The name of the • Malware Name. The name of the malware threat. malware threat. • Count. The number of times that the • Protocol. The protocol in which the malware threat was detected. malware threat was detected. • Percentage. The percentage that the • Date and Time. The date and time that malware threat represents in relation to the malware threat was detected. the total number of detected malware threats. IPS Signatures • Signature Name. The name of the attack. • Signature Name. The name of the • Category. The category in which the attack. attack was detected, such as Web, Mail, Databases, and so on. (For more • information about categories, see Count. The number of times that the attack was detected. Enable and Configure the Intrusion • Percentage. The percentage that the Prevention System on page 187.) attack represents in relation to the total • Date and Time. The date and time that number of detected attacks. the attack was detected. Applications • Application. The name of the application that was blocked. • Application. The name of the application that was blocked. • Category. Instant messaging or peer-to-peer. • Requests. The total number of user requests for the blocked application. • Date and Time. The date and time that • Source IPs. The source IP address the application request was blocked. from which the request came. Web Categories • • • Category. The web category that was blocked. (For more information about web categories, see Configure Web Content Filtering on page 218.) • Date and Time. The date and time that the web request was blocked. • Category. The web category that was blocked. (For more information about web categories, see Configure Web Content Filtering on page 218.) Requests. The total number of user requests for the blocked web category. Source IPs. The source IP address from which the request came. Spam • Email Subject. The email subject line • Recipient. The intended recipient of the in the spam message. spam message. • Date and Time. The date and time that • Emails. The number of spam the spam message was detected. messages for the intended recipient. Monitor System Access and Performance 481