Monitoring System Access and Performance
451
ProSecure Unified Threat Management (UTM) Appliance
 To set the poll interval:
1. Click the Stop button.
2. From the Poll Interval drop-down list, select a new interval. The minimum is 5 seconds; the
maximum is 5 minutes.
3. Click the Set Interval button.
The following table explains the fields of the Total Threats, Threats (Counts), and Total Traffic
(Bytes) sections of the Dashboard screen:
Table 113. Dashboard screen: threats and traffic information
Item Description
Total Threats
Emails Displays the total number of:
• Scanned emails.
• Viruses (malware) detected. For information about how to configure these settings, see
Customize Email Antivirus and Notification Settings on page 186.
• Emails that matched filters. For information about how to configure these settings, see
Email Content Filtering on page 190.
• Spam. For information about how to configure these settings, see Protect Against Email
Spam on page 193.
• Quarantined emails, attachments, and objects. For information about how to configure
these settings, see Customize Email Antivirus and Notification Settings on page 186 and
Configure Distributed Spam Analysis on page 198.
Web Displays the total number of:
• Files scanned.
• Malware detected. For information about how to configure these settings, see Configure
Web Malware Scans on page 202.
• Files blocked. For information about how to configure these settings, see Configure Web
Content Filtering on page 204.
• URLs blocked. For information about how to configure these settings, see Configure Web
URL Filtering on page 211.
• Quarantined web files and objects. For information about how to configure these settings,
see Configure Web Malware Scans on page 202 and Configure FTP Scanning on
page 224.
Applications Displays the total number of:
• Applications blocked.
• Applications logged.
For information about how to configure these settings, see Customize Web Protocol Scan
Settings on page 201.
Network Displays the total number of:
• IPS attack signatures matched.
• Anomaly behaviors detected.
For information about how to configure these settings, see Use the Intrusion Prevention
System on page 178.