Appliance Configuration
Check Point 1400 Appliances Centrally Managed Administration Guide R77.20.85 | 52
• Traffic - By default, shows the total amount of traffic received and sent in an area graph. The
time axis reflects the time frame (last hour or last day) selected for the Network section. For
last hour, the graph shows 5 minute intervals and for last day, hourly intervals. You can click
the Received and Sent links to see only the amount of traffic received or sent. The orange area
on the graph represents sent traffic. The blue area represents received traffic.
If you hover over a time interval, a popup box shows:
• The date and time
• The traffic sent or received
• The total traffic for that time interval
• Total traffic statistics - Next to the area graph you can see total traffic statistics for the last day
or hour.
• Infected devices - Shows the number of:
• Infected devices
• Infected servers
• Recently active infected devices
You can click All Infected Devices to open the Logs & Monitoring > Infected Devices page.
• High risk applications - Shows:
• The number of high risk applications
• The most used high risk applications
• The top users of high risk applications.
You can click Applications Blade Control to open the Access Policy > Firewall Blade Control
page to see Applications and URL Filtering settings.
• Security events - Shows the number of:
• Anti-Bot - Malwares detected by the Security Gateway.
• Anti-Virus - Malwares detected by the Security Gateway.
• Threat Emulation - Malicious files found since the last reboot and how many files scanned.
• The number of IPS attacks.
You can click the links to open the Threat Prevention > Blade Control page.
• System Resources - Click CPU, memory and disk usage to see CPU, memory, and disk usage
information.
• Device Info - Shows Security Gateway information.
• Links to pages that can be useful for monitoring and troubleshooting purposes.
Note - This page is available from the Home and Logs & Monitoring tabs.