Netgear STM300 STM 150-300-600 Reference Manual (PDF) - Page 199

Example: Using Logs to Identify Infected Clients, Log Management, Web traffic, Search

Page 199 highlights

ProSecure Web/Email Security Threat Management (STM) Appliance Example: Using Logs to Identify Infected Clients You can use the STM logs to help identify potentially infected clients on the network. For example, clients that are generating abnormally high volumes of HTTP traffic might be infected with spyware or a virus. To identify infected clients that are sending spyware or a virus in outbound traffic, query the STM spyware and virus logs and see if any of your internal IP addresses are the source of spyware or a virus: 1. On the Log Query screen (see Figure 111 on page 195), select Web traffic as the log type. 2. Select the start date and time from the drop-down lists. 3. Select the end date and time from the drop-down lists. 4. Next to Protocols, select the HTTP check box. 5. Click Search. After a while, the log displays onscreen. 6. Check if there are clients that are sending out suspicious volumes of data, especially to the same destination IP address, on a regular basis. If you find a client exhibiting this behavior, you can run a query on that client's HTTP traffic activities to get more information. Do so by running the same HTTP traffic query and entering the client IP address in the Client IP field. Log Management Generated logs take up space and resources on the STM internal disk. To ensure that there is always sufficient space to save newer logs, the STM automatically deletes older logs whenever the total log size reaches 50 percent of the allocated file size for each log type. Automated log purging means that you do not need to constantly manage the size of the STM logs and ensures that the latest malware incidents and traffic activities are always recorded. Note: The STM saves its logs every 5 minutes. If a power failure affects the STM, logs that were created within the 5-minute period before the power failure occurred are lost. Therefore, NETGEAR recommends that you connect the STM to a syslog server to save the logs externally. For information about how to manually purge selected logs, see Clearing Logs on page 182. Chapter 6. Monitoring System Access and Performance | 199

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261

Chapter 6.
Monitoring System Access and Performance
|
199
ProSecure Web/Email Security Threat Management (STM) Appliance
Example: Using Logs to Identify Infected Clients
You can use the STM logs to help identify potentially infected clients on the network. For
example, clients that are generating abnormally high volumes of HTTP traffic might be
infected with spyware or a virus.
To identify infected clients that are sending spyware or a virus in outbound traffic, query the
STM spyware and virus logs and see if any of your internal IP addresses are the source of
spyware or a virus:
1.
On the Log Query screen (see
Figure 111
on page 195), select
Web traffic
as the log
type.
2.
Select the start date and time from the drop-down lists.
3.
Select the end date and time from the drop-down lists.
4.
Next to Protocols, select the
HTTP
check box.
5.
Click
Search
. After a while, the log displays onscreen.
6.
Check if there are clients that are sending out suspicious volumes of data, especially to the
same destination IP address, on a regular basis.
If you find a client exhibiting this behavior, you can run a query on that client’s HTTP traffic
activities to get more information. Do so by running the same HTTP traffic query and entering
the client IP address in the Client IP field.
Log Management
Generated logs take up space and resources on the STM internal disk. To ensure that there
is always sufficient space to save newer logs, the STM automatically deletes older logs
whenever the total log size reaches 50 percent of the allocated file size for each log type.
Automated log purging means that you do not need to constantly manage the size of the
STM logs and ensures that the latest malware incidents and traffic activities are always
recorded.
Note:
The STM saves its logs every 5 minutes. If a power failure affects
the STM, logs that were created within the 5-minute period before
the power failure occurred are lost. Therefore, NETGEAR
recommends that you connect the STM to a syslog server to save
the logs externally.
For information about how to manually purge selected logs, see
Clearing Logs
on page 182.