Monitor System Access and Performance
479
ProSecure Unified Threat Management (UTM) Appliance
To set the poll interval:
1. Click the Stop button.
2. From the Poll Interval drop-down list, select a new interval. The minimum is 5 seconds; the
maximum is 5 minutes.
3. Click the Set Interval button.
The following table explains the fields of the Total Threats, Threats (Counts), and Total Traffic
(Bytes) sections of the Dashboard screen:
Table 119. Dashboard screen: threats and traffic information
Item Description
Total Threats
Emails Displays the total number of:
• Scanned emails.
• Viruses (malware) detected. For information about how to configure these settings, see
Customize Email Antivirus and Notification Settings on page 196.
• Emails that matched filters. For information about how to configure these settings, see
Email Content Filtering on page 199.
• Spam. For information about how to configure these settings, see Protect Against Email
Spam on page 202.
• Quarantined emails, attachments, and objects. For information about how to configure
these settings, see Customize Email Antivirus and Notification Settings on page 196 and
Configure Distributed Spam Analysis on page 207.
Web Displays the total number of:
• Files scanned.
• Malware detected. For information about how to configure these settings, see Configure
Web Malware or Antivirus Scans on page 216.
• Files blocked. For information about how to configure these settings, see Configure Web
Content Filtering on page 218.
• URLs blocked. For information about how to configure these settings, see Configure Web
URL Filtering on page 224.
• Quarantined web files and objects. For information about how to configure these settings,
see Configure Web Malware or Antivirus Scans on page 216 and Configure FTP
Scanning on page 238.
Applications Displays the total number of:
• Applications blocked.
• Applications logged.
For information about how to configure these settings, see Customize Web Protocol Scan
Settings on page 210.
Network Displays the total number of:
• IPS attack signatures matched.
• Anomaly behaviors detected.
For information about how to configure these settings, see Enable and Configure the Intrusion
Prevention System on page 187.