Netgear STM300 STM 150-300-600 Reference Manual (PDF) - Page 240

Top Infected, Malwares

Page 240 highlights

ProSecure Web/Email Security Threat Management (STM) Appliance Table 63. Report Templates Information (Continued) Activity Information Reported Client IP Address Filtering Options User Domain Web Categories Applications Enable logging of HTTP traffic Filtered For each email server protocol separately, the Emails by number of filtered email messages per month for the Month time range that you specify in the Filtering Options section of the Reports screen: • Chart with the number of filtered email messages     per month • Table with the following items: - Month - Number of filtered email messages per month  Top Infected Top virus or spyware by number of detected Malwares infections or infection attempts received over email messages: • A chart with the number of detected infections or infection attempts per malware     • Table with the following items: - Virus or spyware name - Number of detected infections or infection attempts  Top Infected Top client IP addresses by number of detected virus Clients or spyware infections or infection attempts received over email messages: • Chart with the number of detected virus or spyware infections or infection attempts per client IP address • Table with the following items: - Client IP address - Number of detected virus or spyware infections or infection attempts  Infected For each email server protocol separately, the Malwares by number of detected virus or spyware infections or Hour infection attempts per hour for the time range that you specify in the Filtering Options section of the  Reports screen: • Chart with the number of detected virus or spyware    infections or infection attempts per hour • Table with the following items: - Hour - Number of detected virus or spyware infections or infection attempts per hour  242 | Appendix A. Report Templates

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261

242
|
Appendix A.
Report Templates
ProSecure Web/Email Security Threat Management (STM) Appliance
Filtered
Emails by
Month
For each email server protocol separately, the
number of filtered email messages per month for the
time range that you specify in the Filtering Options
section of the Reports screen:
• Chart with the number of filtered email messages
per month
• Table with the following items:
- Month
- Number of filtered email messages per month
Top Infected
Malwares
Top virus or spyware by number of detected
infections or infection attempts received over email
messages:
• A chart with the number of detected infections or
infection attempts per malware
• Table with the following items:
- Virus or spyware name
- Number of detected infections or infection
attempts
Top Infected
Clients
Top client IP addresses by number of detected virus
or spyware infections or infection attempts received
over email messages:
• Chart with the number of detected virus or spyware
infections or infection attempts per client IP
address
• Table with the following items:
- Client IP address
- Number of detected virus or spyware infections
or infection attempts
Infected
Malwares by
Hour
For each email server protocol separately, the
number of detected virus or spyware infections or
infection attempts per hour for the time range that
you specify in the Filtering Options section of the
Reports screen:
• Chart with the number of detected virus or spyware
infections or infection attempts per hour
• Table with the following items:
- Hour
- Number of detected virus or spyware infections
or infection attempts per hour
Table 63.
Report Templates Information (Continued)
Activity
Information Reported
Filtering Options
Enable
logging
of HTTP
traffic
Client IP
Address
User
Domain
Web
Categories
Applications