Netgear STM300 STM 150-300-600 Reference Manual (PDF) - Page 175

Monitoring System Access and Performance, Configuring Logging, Alerts, and Event Notifications

Page 175 highlights

6. Monitoring System Access and Performance 6 This chapter describes the system monitoring features of the STM. You can be alerted to important events such as attacks and login failures. You can also view the system status and real-time traffic and security information. In addition, the diagnostics utilities are described. Note: All email notification functions that are part of the Logs, Reports, and Alerts menus, and some of the functions that are part of the Diagnostics configuration menu require that you configure the email notification server-see Configuring the Email Notification Server on page 176. This chapter contains the following sections: • Configuring Logging, Alerts, and Event Notifications on this page • Monitoring Real-Time Traffic, Security, Statistics, and Web Usage on page 184 • Viewing System Status on page 192 • Querying Logs on page 194 • Viewing, Scheduling, and Generating Reports on page 200 • Viewing and Managing the Quarantine Files on page 208 • Using Diagnostics Utilities on page 215 Configuring Logging, Alerts, and Event Notifications You can configure the STM to email logs and alerts to a specified email address. For example, the STM can email security-related events such as malware incidents, infected clients, and failed authentications. By default, the STM logs content filtering events such as attempts to access blocked sites and URLs, unwanted email content, spam attempts, and many other types of events. For you to receive the logs in an email message, the STM's notification server needs to be configured and email notification needs to be enabled. If the notification server is not configured or email notification is disabled, you can still query the logs and generate log reports to view on the Web Management Interface or to save in CSV format. Chapter 6. Monitoring System Access and Performance | 175

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261

Chapter 6.
Monitoring System Access and Performance
|
175
6
6.
Monitoring System Access and
Performance
This chapter describes the system monitoring features of the STM. You can be alerted to
important events such as attacks and login failures. You can also view the system status and
real-time traffic and security information. In addition, the diagnostics utilities are described.
Note:
All email notification functions that are part of the Logs, Reports,
and Alerts menus, and some of the functions that are part of the
Diagnostics configuration menu require that you configure the email
notification server—see
Configuring the Email Notification Server
on
page 176.
This chapter contains the following sections:
Configuring Logging, Alerts, and Event Notifications
on this page
Monitoring Real-Time Traffic, Security, Statistics, and Web Usage
on page 184
Viewing System Status
on page 192
Querying Logs
on page 194
Viewing, Scheduling, and Generating Reports
on page 200
Viewing and Managing the Quarantine Files
on page 208
Using Diagnostics Utilities
on page 215
Configuring Logging, Alerts, and Event Notifications
You can configure the STM to email logs and alerts to a specified email address. For
example, the STM can email security-related events such as malware incidents, infected
clients, and failed authentications. By default, the STM logs content filtering events such as
attempts to access blocked sites and URLs, unwanted email content, spam attempts, and
many other types of events.
For you to receive the logs in an email message, the STM’s notification server needs to be
configured and email notification needs to be enabled. If the notification server is not
configured or email notification is disabled, you can still query the logs and generate log
reports to view on the Web Management Interface or to save in CSV format.