H3C Technologies H3C SecCenter UTM Manager User Manual
Page 6

ii
Top users' traffic statistics ····································································································································· 69
Realtime traffic monitoring of a single user ········································································································ 71
Service traffic trend of a single user···················································································································· 72
Service traffic distribution of a single user·········································································································· 75
Detailed session statistics······································································································································ 77
Service traffic analysis by IP group······························································································································ 78
Managing IP groups ············································································································································· 78
Realtime traffic snapshots of an IP group············································································································ 81
Service traffic trend of an IP group······················································································································ 82
Service traffic distribution of an IP group ··········································································································· 85
Traffic statistics of top users in an IP group ········································································································ 87
Behavior auditing·······················································································································································89
User behavior analysis ·················································································································································· 89
Website analysis ··················································································································································· 89
Email application analysis···································································································································· 91
User behavior auditing·················································································································································· 92
Web application auditing ···································································································································· 92
FTP application auditing······································································································································· 93
Email application auditing ··································································································································· 94
Instant message application auditing·················································································································· 95
Telnet application auditing··································································································································· 96
SQL application auditing······································································································································ 97
NAT logs auditing ················································································································································· 98
Quick auditing······················································································································································· 99
User details ··························································································································································100
User behavior alarm ···········································································································································101
Database auditing and analysis·································································································································103
Viewing database access snapshot ··················································································································103
Viewing database access trend analysis··········································································································105
Viewing database access details ······················································································································109
Managing SQL statement filtering conditions ··································································································111
Managing database access alarms ··················································································································113
URL analysis··································································································································································118
Event snapshot ·····················································································································································118
Aggregate analysis ·············································································································································119
User action analysis ············································································································································120
Category auditing ···············································································································································121
Audit logs backup························································································································································122
Backing up manually ··········································································································································122
Scheduling auto backup·····································································································································124
Importing backed up logs···································································································································125
IPS management······················································································································································ 128
Device management ····················································································································································128
Managing UTM devices ·····································································································································128
Managing signature files····································································································································131
Rule list··································································································································································133
Displaying device statistics·································································································································134
Realtime monitoring ·····················································································································································135
Displaying event snapshots ································································································································135
Displaying attack/virus/DDoS snapshot list·····································································································139
Monitoring devices··············································································································································141
Event analysis ·······························································································································································142
Displaying attack/virus/DDoS attack event analysis reports ·········································································142