Netgear STM300 STM 150-300-600 Reference Manual (PDF) - Page 236

Client IP address, Top Infected

Page 236 highlights

ProSecure Web/Email Security Threat Management (STM) Appliance Table 63. Report Templates Information (Continued) Activity Information Reported Client IP Address Filtering Options User Domain Web Categories Applications Enable logging of HTTP traffic Blocked For each Web server protocol separately, the number Files By of blocked file extension requests per month for the Month time range that you specify in the Filtering Options section of the Reports screen: • Chart with the number of blocked file extension requests per month   • Table with the following items: - Month - Number of blocked file extension requests per month  Top Infected Top malware by number of detected infections or Malwares infection attempts received over Web requests: • A chart with the number of detected infections or infection attempts per malware • Table with the following items: - Malware name - Number of detected infections or infection attempts  Top Infected Clients Top client IP addresses by number of detected malware infections or infection attempts received over Web requests: • Chart with the number of detected malware infections or infection attempts per client IP address • Table with the following items: - Client IP address - Number of detected malware infections or infection attempts  Infected For each Web server protocol separately, the number Malwares by of detected malware infections or infection attempts Hour per hour for the time range that you specify in the Filtering Options section of the Reports screen: • Chart with the number of detected malware infections or infection attempts per hour • Table with the following items: - Hour - Number of detected malware infections or infection attempts per hour  Infected For each Web server protocol separately, the number Malwares by of detected malware infections or infection attempts Day per day for the time range that you specify in the Filtering Options section of the Reports screen: • Chart with the number of detected malware infections or infection attempts per day • Table with the following items: - Day - Number of detected malware infections or infection attempts per day  238 | Appendix A. Report Templates

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261

238
|
Appendix A.
Report Templates
ProSecure Web/Email Security Threat Management (STM) Appliance
Blocked
Files By
Month
For each Web server protocol separately, the number
of blocked file extension requests per month for the
time range that you specify in the Filtering Options
section of the Reports screen:
• Chart with the number of blocked file extension
requests per month
• Table with the following items:
- Month
- Number of blocked file extension requests per
month
Top Infected
Malwares
Top malware by number of detected infections or
infection attempts received over Web requests:
• A chart with the number of detected infections or
infection attempts per malware
• Table with the following items:
- Malware name
- Number of detected infections or infection
attempts
Top Infected
Clients
Top client IP addresses by number of detected
malware infections or infection attempts received
over Web requests:
• Chart with the number of detected malware
infections or infection attempts per client IP
address
• Table with the following items:
- Client IP address
- Number of detected malware infections or
infection attempts
Infected
Malwares by
Hour
For each Web server protocol separately, the number
of detected malware infections or infection attempts
per hour for the time range that you specify in the
Filtering Options section of the Reports screen:
• Chart with the number of detected malware
infections or infection attempts per hour
• Table with the following items:
- Hour
- Number of detected malware infections or
infection attempts per hour
Infected
Malwares by
Day
For each Web server protocol separately, the number
of detected malware infections or infection attempts
per day for the time range that you specify in the
Filtering Options section of the Reports screen:
• Chart with the number of detected malware
infections or infection attempts per day
• Table with the following items:
- Day
- Number of detected malware infections or
infection attempts per day
Table 63.
Report Templates Information (Continued)
Activity
Information Reported
Filtering Options
Enable
logging
of HTTP
traffic
Client IP
Address
User
Domain
Web
Categories
Applications