H3c-technologies H3C SecCenter UTM Manager Manual do Utilizador Página 6

  • Descarregar
  • Adicionar aos meus manuais
  • Imprimir
  • Página
    / 262
  • Índice
  • MARCADORES
  • Avaliado. / 5. Com base em avaliações de clientes
Vista de página 5
ii
Top users' traffic statistics ····································································································································· 69
Realtime traffic monitoring of a single user ········································································································ 71
Service traffic trend of a single user···················································································································· 72
Service traffic distribution of a single user·········································································································· 75
Detailed session statistics······································································································································ 77
Service traffic analysis by IP group······························································································································ 78
Managing IP groups ············································································································································· 78
Realtime traffic snapshots of an IP group············································································································ 81
Service traffic trend of an IP group······················································································································ 82
Service traffic distribution of an IP group ··········································································································· 85
Traffic statistics of top users in an IP group ········································································································ 87
Behavior auditing·······················································································································································89
User behavior analysis ·················································································································································· 89
Website analysis ··················································································································································· 89
Email application analysis···································································································································· 91
User behavior auditing·················································································································································· 92
Web application auditing ···································································································································· 92
FTP application auditing······································································································································· 93
Email application auditing ··································································································································· 94
Instant message application auditing·················································································································· 95
Telnet application auditing··································································································································· 96
SQL application auditing······································································································································ 97
NAT logs auditing ················································································································································· 98
Quick auditing ······················································································································································· 99
User details ··························································································································································100
User behavior alarm ···········································································································································101
Database auditing and analysis·································································································································103
Viewing database access snapshot ··················································································································103
Viewing database access trend analysis··········································································································105
Viewing database access details ······················································································································109
Managing SQL statement filtering conditions ··································································································111
Managing database access alarms ··················································································································113
URL analysis··································································································································································118
Event snapshot ·····················································································································································118
Aggregate analysis ·············································································································································119
User action analysis ············································································································································120
Category auditing ···············································································································································121
Audit logs backup ························································································································································122
Backing up manually ··········································································································································122
Scheduling auto backup·····································································································································124
Importing backed up logs···································································································································125
IPS management······················································································································································ 128
Device management ····················································································································································128
Managing UTM devices ·····································································································································128
Managing signature files····································································································································131
Rule list··································································································································································133
Displaying device statistics·································································································································134
Realtime monitoring ·····················································································································································135
Displaying event snapshots ································································································································135
Displaying attack/virus/DDoS snapshot list·····································································································139
Monitoring devices··············································································································································141
Event analysis ·······························································································································································142
Displaying attack/virus/DDoS attack event analysis reports ·········································································142
Vista de página 5
1 2 3 4 5 6 7 8 9 10 11 ... 261 262

Comentários a estes Manuais

Sem comentários