beautypg.com

H3C Technologies H3C SecCenter UTM Manager User Manual

Page 6

background image

ii

Top users' traffic statistics ····································································································································· 69

Realtime traffic monitoring of a single user ········································································································ 71

Service traffic trend of a single user···················································································································· 72

Service traffic distribution of a single user·········································································································· 75

Detailed session statistics······································································································································ 77

Service traffic analysis by IP group······························································································································ 78

Managing IP groups ············································································································································· 78

Realtime traffic snapshots of an IP group············································································································ 81

Service traffic trend of an IP group······················································································································ 82

Service traffic distribution of an IP group ··········································································································· 85

Traffic statistics of top users in an IP group ········································································································ 87

Behavior auditing·······················································································································································89

User behavior analysis ·················································································································································· 89

Website analysis ··················································································································································· 89

Email application analysis···································································································································· 91

User behavior auditing·················································································································································· 92

Web application auditing ···································································································································· 92

FTP application auditing······································································································································· 93

Email application auditing ··································································································································· 94

Instant message application auditing·················································································································· 95

Telnet application auditing··································································································································· 96

SQL application auditing······································································································································ 97

NAT logs auditing ················································································································································· 98

Quick auditing······················································································································································· 99

User details ··························································································································································100

User behavior alarm ···········································································································································101

Database auditing and analysis·································································································································103

Viewing database access snapshot ··················································································································103

Viewing database access trend analysis··········································································································105

Viewing database access details ······················································································································109

Managing SQL statement filtering conditions ··································································································111

Managing database access alarms ··················································································································113

URL analysis··································································································································································118

Event snapshot ·····················································································································································118

Aggregate analysis ·············································································································································119

User action analysis ············································································································································120

Category auditing ···············································································································································121

Audit logs backup························································································································································122

Backing up manually ··········································································································································122

Scheduling auto backup·····································································································································124

Importing backed up logs···································································································································125

IPS management······················································································································································ 128

Device management ····················································································································································128

Managing UTM devices ·····································································································································128

Managing signature files····································································································································131

Rule list··································································································································································133

Displaying device statistics·································································································································134

Realtime monitoring ·····················································································································································135

Displaying event snapshots ································································································································135

Displaying attack/virus/DDoS snapshot list·····································································································139

Monitoring devices··············································································································································141

Event analysis ·······························································································································································142

Displaying attack/virus/DDoS attack event analysis reports ·········································································142