ProSecure Unified Threat Management UTM10 or UTM25 Reference Manual
Monitoring System Access and Performance 11-39
v1.0, September 2009
Scheduling and Generating Reports
The UTM lets you schedule and generate three types of reports:
• Email Reports. For each protocol (SMTP, POP3, and IMAP), the report shows, the following
information per day, both in tables and graphics:
– Number of connections
– Traffic amount in MB
– Number of malware incidents
– Number of files blocked
– Number of blacklist violations (not applicable to POP3 and IMAP)
– Number of e-mails captured by Distributed Spam Analysis (not applicable to IMAP).
• Web Reports. For each protocol (HTTP HTTPS, and FTP), the report shows the following
information per day, both in tables and graphics:
– Number of connections
– Traffic amount in MB
– Number of malware incidents
– Number of files blocked
– Number of URLs blocked (not applicable to FTP)
• System Reports. The report shows IPS, application, and malware incidents:
– The following IPS incident are shown per day, both in tables and graphics:
• Number of detected port scans and top 10 scanned destination IP addresses by count
• Number of Web attacks
• Number of mail attacks
• Number of database attacks
• Number of application attacks
• Number of network protocol attacks
• Number of malware attacks
• Number of miscellaneous attacks
• Top 10 attacking IPS rule names by count, top 10 attacking source IP addresses by
count, and top 10 attacked destination IP addresses by count.