NETGEAR UTM25-100NAS Router User Manual


 
ProSecure Unified Threat Management UTM10 or UTM25 Reference Manual
11-40 Monitoring System Access and Performance
v1.0, September 2009
The following application incident are shown per day, both in tables and graphics:
Number of instant messaging application violations, top 10 violating instant
messaging applications by count, and top 10 violating instant messaging clients by
count
Number of peer-to-peer application violations, top 10 violating peer-to-peer
applications by count, and top 10 violating peer-to-peer clients by count
The following malware incident are shown per day, both in tables and graphics:
The number of SMPT, POP3, and IMAP incidents, the top 10 e-mail malware threats
by count, and the top 10 infected e-mail clients by count.
The number of HTTP, HTTPS, and FTP incidents, the top 10 Web malware threats by
count, and the top 10 infected Web clients by count.
The reports that you select are generated as both Microsoft Office Comma Separated Values
(CSV) and MHTML files. The CSV files do not contain headers for the tables nor graphics, but the
MHTML files contain both. You can download the reports as zipped files.
Generating Reports
To generate a report:
1. Select Monitoring > Logs & Reports from the menu. The Logs & Reports submenu tabs
appear, with the Email and Syslog screen in view.
2. Click the Generate Reports submenu tab. The Generate Reports screen displays (see
Table 11-24 on page 11-41).