Netgear STM300 STM 150-300-600 Reference Manual (PDF) - Page 237

Email Activity, Activity, Information Reported, Filtering Options, User Activity

Page 237 highlights

ProSecure Web/Email Security Threat Management (STM) Appliance Table 63. Report Templates Information (Continued) Activity Information Reported Client IP Address Filtering Options User Domain Web Categories Applications Enable logging of HTTP traffic Infected For each Web server protocol separately, the number Malwares by of detected malware infections or infection attempts Month per month for the time range that you specify in the Filtering Options section of the Reports screen: • Chart with the number of detected malware infections or infection attempts per month • Table with the following items: - Month - Number of detected malware infections or infection attempts per month User Activity Top users by number of blocked and allowed Web requests: • Chart with the number of blocked and allowed Web requests per user • Table with the following items: - User identity - Last time that the user was detected ("Last seen") - Total number of Web requests - Number of allowed Web requests - Number of blocked Web requests - Associated bandwidth usage  Email Activity Top Spam For the blacklist and real-time blacklist combined and Senders by for the distributed spam analysis separately, the top Requests spam senders by number of detected spam  messages: • Chart with the number of detected spam messages      per sender • Table with the following items: - Sender's email address - Number of detected spam messages Top Spam For the blacklist and real-time blacklist combined and Recipients for the distributed spam analysis separately, the top by Requests spam recipients by number of detected spam  messages: • Chart with the number of detected spam messages      per recipient • Table with the following items: - Recipient's email address - Number of detected spam messages Appendix A. Report Templates | 239

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261

Appendix A.
Report Templates
|
239
ProSecure Web/Email Security Threat Management (STM) Appliance
Infected
Malwares by
Month
For each Web server protocol separately, the number
of detected malware infections or infection attempts
per month for the time range that you specify in the
Filtering Options section of the Reports screen:
• Chart with the number of detected malware
infections or infection attempts per month
• Table with the following items:
- Month
- Number of detected malware infections or
infection attempts per month
User Activity
Top users by number of blocked and allowed Web
requests:
• Chart with the number of blocked and allowed Web
requests per user
• Table with the following items:
- User identity
- Last time that the user was detected (“Last
seen”)
- Total number of Web requests
- Number of allowed Web requests
- Number of blocked Web requests
- Associated bandwidth usage
Email Activity
Top Spam
Senders by
Requests
For the blacklist and real-time blacklist combined and
for the distributed spam analysis separately, the top
spam senders by number of detected spam
messages:
• Chart with the number of detected spam messages
per sender
• Table with the following items:
- Sender’s email address
- Number of detected spam messages
Top Spam
Recipients
by Requests
For the blacklist and real-time blacklist combined and
for the distributed spam analysis separately, the top
spam recipients by number of detected spam
messages:
• Chart with the number of detected spam messages
per recipient
• Table with the following items:
- Recipient’s email address
- Number of detected spam messages
Table 63.
Report Templates Information (Continued)
Activity
Information Reported
Filtering Options
Enable
logging
of HTTP
traffic
Client IP
Address
User
Domain
Web
Categories
Applications