Netgear STM300 STM 150-300-600 Reference Manual (PDF) - Page 184

Monitoring Real-Time Traffic, Security, Statistics, and Web Usage

Page 184 highlights

ProSecure Web/Email Security Threat Management (STM) Appliance Table 53. Alerts Settings (Continued) Setting Description (or Subfield and Description) Enable Malware Select this check box to enable malware outbreak alerts, and configure the Outbreak Outbreak Alerts Criteria, Protocol, and Subject fields. Outbreak Criteria To define a malware outbreak, specify the following fields: • malware found within. The number of malware incidents that are detected. • minutes (maximum 90 minutes). The period in which the specified number of malware incidents are detected. Note: When the specified number of detected malware incidents is reached within the time threshold, the STM sends a malware outbreak alert. Protocol Select the check box or check boxes to specify the protocols (SMTP, POP3, IMAP, HTTP, HTTPS, and FTP) for which malware incidents are detected. Subject Enter the subject line for the email alert. 3. Click Apply to save your settings. Monitoring Real-Time Traffic, Security, Statistics, and Web Usage You can monitor the real-time traffic, security events, and statistics from the Dashboard screen. The Web Usage screen displays which hosts on your network are consuming the most resources. Understanding the Information on the Dashboard Screen When you start up the STM, the default screen that displays is the Dashboard screen, which lets you monitor the following items: • CPU, memory, and hard disk status • The number of active connections per protocol • The total malware threats and the malware threats over the last seven days • Total scanned services traffic over the last seven days • Statistics for the most recent five and top five malware threats detected, applications blocked, Web categories blocked, and spam emails blocked • The real-time security scanning status with detected network traffic, detected network threats, and service statistics for the six supported protocols (HTTP, HTTPS, FTP, SMTP, POP3, and IMAP) • Interface statistics 184 | Chapter 6. Monitoring System Access and Performance

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261

184
|
Chapter 6.
Monitoring System Access and Performance
ProSecure Web/Email Security Threat Management (STM) Appliance
3.
Click
Apply
to save your settings.
Monitoring Real-Time Traffic, Security, Statistics, and
Web Usage
You can monitor the real-time traffic, security events, and statistics from the Dashboard
screen. The Web Usage screen displays which hosts on your network are consuming the
most resources.
Understanding the Information on the Dashboard Screen
When you start up the STM, the default screen that displays is the Dashboard screen, which
lets you monitor the following items:
CPU, memory, and hard disk status
The number of active connections per protocol
The total malware threats and the malware threats over the last seven days
Total scanned services traffic over the last seven days
Statistics for the most recent five and top five malware threats detected, applications
blocked, Web categories blocked, and spam emails blocked
The real-time security scanning status with detected network traffic, detected network
threats, and service statistics for the six supported protocols (HTTP, HTTPS, FTP, SMTP,
POP3, and IMAP)
Interface statistics
Enable Malware
Outbreak Alerts
Select this check box to enable malware outbreak alerts, and configure the Outbreak
Criteria, Protocol, and Subject fields.
Outbreak
Criteria
To define a malware outbreak, specify the following fields:
malware found within
. The number of malware incidents that are
detected.
minutes (maximum 90 minutes)
. The period in which the specified
number of malware incidents are detected.
Note:
When the specified number of detected malware incidents is
reached within the time threshold, the STM sends a malware outbreak alert.
Protocol
Select the check box or check boxes to specify the protocols (
SMTP
,
POP3
,
IMAP
,
HTTP
,
HTTPS
, and
FTP
) for which malware incidents are detected.
Subject
Enter the subject line for the email alert.
Table 53.
Alerts Settings (Continued)
Setting
Description (or Subfield and Description)