Netgear STM300 STM 150-300-600 Reference Manual (PDF) - Page 206

Table 60., Advanced Filtering Options Settings

Page 206 highlights

ProSecure Web/Email Security Threat Management (STM) Appliance 5. Configure the advanced filtering options as explained in the following table: Table 60. Advanced Filtering Options Settings Setting Description Top Count Enter a number between 1 and 100 to specify how many entries are included in reports that provide a top count, such as the Top Users by Requests report or the Top Spam Senders by Requests report. The default number is 10, which means that 10 users are included in the Top Users by Requests report and 10 senders are included in the Top Spam Senders by Requests report. Chart Type Specify the type of chart that is generated in the report by making one of the following selections from the drop-down list: • Vertical Bars. This is the default selection. • Line. • Pie. Output Format Specify the output format of the report by making one of the following selections from the drop-down list: • HTML. The report is generated as a zipped file that contains MIME HTML (MHTML or MTH) files. This is the default setting. • PDF. The report is generated as a zipped file that contains PDF files. • CSV. The report is generated as a zipped file that contains comma-separated values (CSV) files. Client IP Address To filter the report results on a client IP address, enter the IP address and optional subnet mask in the IP Address fields below the Client IP Address table, and then click the Add table button to add the IP address to the Client IP Address table. You can add multiple IP addresses to the table. To delete an entry from the Client IP Address table, select the entry, and then click the Delete table button. User To filter the report results on a user identity, make a selection from the User Type drop-down list below the User table. The screen adjusts depending on your selection; the different options are explained in the following rows in this table. After you have specified the user identity, click the Add table button to add the user to the User table. You can add multiple users to the table. Wildcarts (*) are supported. To delete an entry from the User table, select the entry, and then click the Delete table button. Authenticated Enter the name of an authenticated user, or use wildcards to specify a group of users. To specify all authenticated users, enter *. Then click the Add table button. You can add multiple users to the User table. Unauthenticated You cannot further specify unauthenticated users; just click the Add table button. 206 | Chapter 6. Monitoring System Access and Performance

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261

206
|
Chapter 6.
Monitoring System Access and Performance
ProSecure Web/Email Security Threat Management (STM) Appliance
5.
Configure the advanced filtering options as explained in the following table:
Table 60.
Advanced Filtering Options Settings
Setting
Description
Top Count
Enter a number between 1 and 100 to specify how many entries are included in reports
that provide a top count, such as the Top Users by Requests report or the Top Spam
Senders by Requests report.
The default number is 10, which means that 10 users are included in the Top Users by
Requests report and 10 senders are included in the Top Spam Senders by Requests
report.
Chart Type
Specify the type of chart that is generated in the report by making one of the following
selections from the drop-down list:
Vertical Bars
. This is the default selection.
Line
.
Pie
.
Output Format
Specify the output format of the report by making one of the following selections from
the drop-down list:
HTML
. The report is generated as a zipped file that contains MIME HTML (MHTML
or MTH) files. This is the default setting.
PDF
. The report is generated as a zipped file that contains PDF files.
CSV
. The report is generated as a zipped file that contains comma-separated values
(CSV) files.
Client IP Address
To filter the report results on a client IP address, enter the IP address and optional
subnet mask in the IP Address fields below the Client IP Address table, and then click
the
Add
table button to add the IP address to the Client IP Address table. You can add
multiple IP addresses to the table.
To delete an entry from the Client IP Address table, select the entry, and then click the
Delete
table button.
User
To filter the report results on a user identity, make a selection from the User Type
drop-down list below the User table. The screen adjusts depending on your selection;
the different options are explained in the following rows in this table. After you have
specified the user identity, click the
Add
table button to add the user to the User table.
You can add multiple users to the table. Wildcarts (*) are supported.
To delete an entry from the User table, select the entry, and then click the
Delete
table
button.
Authenticated
Enter the name of an authenticated user, or use wildcards to
specify a group of users. To specify all authenticated users, enter
*
. Then click the
Add
table button. You can add multiple users to
the User table.
Unauthenticated
You cannot further specify unauthenticated users; just click the
Add
table button.