Netgear STM300 STM 150-300-600 Reference Manual (PDF) - Page 186

Set Interval, Clear Statistics, To set the poll interval

Page 186 highlights

ProSecure Web/Email Security Threat Management (STM) Appliance To set the poll interval: 1. Click the Stop button. 2. From the Poll Interval drop-down list, select a new interval (the minimum is 5 seconds, the maximum is 5 minutes). 3. Click the Set Interval button. To clear the statistics, click Clear Statistics. The following table explains the fields of the Status, Total Threats, and Threats (Last 7 Days) sections of the Dashboard screen: Table 54. Dashboard: Status, Total Threats, and Threats (Last 7 Days) Information Item Description Status System The current CPU, memory, and hard disk usage. When usage is within safe limits, the status bars show green. Services The protocols that are being scanned for malware threats. ON, OFF, or HALT is stated next to the protocol, and the number of active connections for each protocol. ON indicates that protocol is scanned; OFF indicates that the protocol is not scanned; HALT indicates that you enabled protocol scanning but the protection license has expired. Active The number of active connection per protocol. Connections Application Control ON indicates that application control is enabled; OFF indicates that application control is disabled; HALT indicates that you enabled application control but the protection license has expired. For information about how to configure application control, see Configuring Application Control on page 127. Total Threats (Since Last Clear) Email Displays the total number of: • Scanned (emails). • Files blocked (see Email Content Filtering on page 94). • Quarantined (see Email Content Filtering on page 94). • Malware detected (see Customizing Email Anti-Virus Settings on page 88). • Spam (see Protecting Against Email Spam on page 97). Web Displays the total number of: • Scanned (files). • Files blocked (see Configuring Web Content Filtering on page 109). • Quarantined (see Configuring Web Content Filtering on page 109). • Malware detected (see Configuring Web Malware Scans on page 107). • URLs blocked (see Configuring Web URL Filtering on page 116). 186 | Chapter 6. Monitoring System Access and Performance

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261

186
|
Chapter 6.
Monitoring System Access and Performance
ProSecure Web/Email Security Threat Management (STM) Appliance
To set the poll interval:
1.
Click the
Stop
button.
2.
From the Poll Interval drop-down list, select a new interval (the minimum is 5 seconds, the
maximum is 5 minutes).
3.
Click the
Set Interval
button.
To clear the statistics, click
Clear Statistics
.
The following table explains the fields of the Status, Total Threats, and Threats (Last 7 Days)
sections of the Dashboard screen:
Table 54.
Dashboard: Status, Total Threats, and Threats (Last 7 Days) Information
Item
Description
Status
System
The current CPU, memory, and hard disk usage. When usage is within safe limits, the status bars
show green.
Services
The protocols that are being scanned for malware threats. ON, OFF, or HALT is stated next to the
protocol, and the number of active connections for each protocol.
ON indicates that protocol is scanned; OFF indicates that the protocol is not scanned; HALT
indicates that you enabled protocol scanning but the protection license has expired.
Active
Connections
The number of active connection per protocol.
Application
Control
ON indicates that application control is enabled; OFF indicates that application control is disabled;
HALT indicates that you enabled application control but the protection license has expired.
For information about how to configure application control, see
Configuring Application Control
on
page 127.
Total Threats (Since Last Clear)
Email
Displays the total number of:
• Scanned (emails).
• Files blocked (see
Email Content Filtering
on page 94).
• Quarantined (see
Email Content Filtering
on page 94).
• Malware detected (see
Customizing Email Anti-Virus Settings
on page 88).
• Spam (see
Protecting Against Email Spam
on page 97).
Web
Displays the total number of:
• Scanned (files).
• Files blocked (see
Configuring Web Content Filtering
on page 109).
• Quarantined (see
Configuring Web Content Filtering
on page 109).
• Malware detected (see
Configuring Web Malware Scans
on page 107).
• URLs blocked (see
Configuring Web URL Filtering
on page 116).