EasyManua.ls Logo

Check Point L-71 - Using System Tools

Check Point L-71
124 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Appliance Configuration
Check Point 1400 Appliances Centrally Managed Administration Guide R77.20.85 | 54
The report includes these sections:
Executive Summary
Table of Contents
Report Pages
Executive Summary
The first page of the report is the executive summary and shows:
The number of Anti-Bot, Anti-Virus, and Threat Emulation malware detected by the Security
Gateway and the number of IPS attacks.
Top bandwidth consuming statistics by category, site, and user. You can click the Top category,
Top site, or Top user link to get to the applicable report page. It also shows Bandwidth Usage
by Applications statistics for the top 5 applications in a doughnut chart and total traffic
received and sent.
The number of infected devices, servers, and recently active infected devices.
The number of high risk applications, the most used high risk applications, and the top users
of high risk applications.
The Security Gateway name, version, and MAC address.
Table of Contents
The table of contents contains links to the network analysis, security analysis, and infected
devices reports. Click a link to go directly to the selected section.
Report Pages
Each report page shows a detailed graph, table, and descriptions.
Note - This page is available from the Home and Logs & Monitoring tabs.
Using System Tools
On the Tools page you can:
Monitor system resources.
Show the routing table.
Verify the appliance connectivity to Cloud Services.
Display DSL Statistics (DSL models only)
Generate a CPInfo file.
Ping or trace an IP address.
Perform a DNS lookup.
Capture packets.
Download the console-USB driver

Table of Contents

Other manuals for Check Point L-71

Related product manuals