Monitor System Access and Performance
528
ProSecure Unified Threat Management (UTM) Appliance
Top n Applications by
Bandwidth
A chart and a table with the applications for which most bandwidth was
consumed and the size of the bandwidth consumed (expressed in bytes),
and drill-down links to the users who accessed the applications.
When you click the drill-down link for a user, the Applications Bandwidth by
User chart and table display, showing the users who consumed most
bandwidth for the application. For each user, the user login name (including
the domain to which the user belongs) and the size of the bandwidth
consumed (expressed in bytes) are shown.
Top n Users by Bandwidth A chart and a table with the users who consumed most bandwidth and the
size of the bandwidth consumed (expressed in bytes), and drill-down links to
the applications for which most bandwidth was consumed.
When you click the drill-down link for an application, the User Bandwidth by
Applications chart and table display, showing the applications for which the
user consumed most bandwidth. For each application, the size of the
bandwidth consumed (expressed in bytes) is shown.
Applications Bandwidth
Usage by Time
A chart and a table with the bandwidth usage (expressed in bytes) and the
numbers of applications for which bandwidth was consumed, and drill-down
links to the applications for which bandwidth was consumed.
When you click the drill-down link for the applications, the Applications
Bandwidth Usage chart and table display, showing the individual
applications for which most bandwidth was consumed. For each application,
the size of the bandwidth consumed (expressed in bytes) is shown.
Users Bandwidth Usage by
Time
A chart and a table with the bandwidth usage (expressed in bytes) and the
numbers of users who consumed bandwidth, and drill-down links to the
users who consumed bandwidth.
When you click the drill-down link for the users, the User Bandwidth Usage
chart and table display, showing the individual users who consumed most
bandwidth. For each user, the size of the bandwidth consumed (expressed
in bytes) is shown.
Email Activity
Malware Incidents By Time For each of the three email server protocols separately, a chart and a table
with the number of detected malware incidents.
Email Filter By Time For each of the three email server protocols separately, a chart and a table
with the number of filtered (blocked) files (attachments).
Spams By Time For the POP3 and SMTP protocols separately, a chart and a table with the
number of spam emails that are detected by distributed spam analysis.
Requests By Time For each of the three email server protocols separately, a chart and a table
with the number of processed emails.
Traffic By Time For each of the three email server protocols separately, a chart and a table
with the processed traffic, expressed in bytes.
Table 137. Report screen: report template information (continued)
Report template Information reported for the specified time range