6
Figure 44, IM Management menu (expended) ................................................................... 43
Figure 45, IM Login Notice - configuration ........................................................................ 44
Figure 46, IM Login Notice – MSN Example ....................................................................... 45
Figure 47, IM notice - NetBIOS example........................................................................... 45
Figure 48, IM notice – ICQ ............................................................................................. 46
Figure 49, IM Authentication Messages ............................................................................ 47
Figure 50, IM Authentication - Default Rules ..................................................................... 49
Figure 51, IM Authentication - Account Rules .................................................................... 51
Figure 52, P2P Management - Default Rule ....................................................................... 52
Figure 53, P2P Management - User Rule........................................................................... 53
Figure 54, General settings of capturing ........................................................................... 55
Figure 55, Example of the Record / Setting page ............................................................... 55
Figure 56, Default Character Encoding ............................................................................. 57
Figure 57, Captured data by user .................................................................................... 59
Figure 58, Customer view search by user ......................................................................... 60
Figure 59, Record / Service ............................................................................................ 61
Figure 60, Records Captured - SMTP................................................................................ 61
Figure 61, Records Captured - Forward ............................................................................ 62
Figure 62, Records Captured - SMTP Search ..................................................................... 62
Figure 63, Download the search result ............................................................................. 63
Figure 64, Records Captured - POP3/IMAP ........................................................................ 64
Figure 65, Records Captured - HTTP ................................................................................ 65
Figure 66, Records Captured - IM .................................................................................... 66
Figure 67, Records Captured - Web SMTP......................................................................... 67
Figure 68, Records Captured - Web POP3 ......................................................................... 68
Figure 69, Records Captured – FTP .................................................................................. 69
Figure 70, Records Captured - FTP, download a copy ......................................................... 69
Figure 71, Records Captured – Telnet Sessions ................................................................. 70
Figure 72, Telnet Session Details..................................................................................... 70
Figure 73, Flow Analysis - Menu ...................................................................................... 71
Figure 74, Flow Analysis - Today Top 10........................................................................... 72
Figure 75, Flow Analysis - Top N ..................................................................................... 74
Figure 76, Flow Analysis - Statistics Chart ........................................................................ 76
Figure 77, Anomaly flow IP menu .................................................................................... 77
Figure 78, Anomaly flow detect - general settings.............................................................. 78
Figure 79, Virus-infected IP ............................................................................................ 79
Figure 80, NetBIOS Notification Shown to the Victim User................................................... 79
Figure 81, Virus-infected IP Email alerts ........................................................................... 79
Figure 82, Example of Intrusion IP detection..................................................................... 80
Figure 83, Local Disk Menu............................................................................................. 81
Figure 84, Storage Time ................................................................................................ 82
Figure 85, Disk Space Usage .......................................................................................... 84
Figure 86, Disk Space Usage Report ................................................................................ 84
Figure 87, Disk space usage details (continued) ................................................................ 85