1 / 33

Internet Monitoring and Reporting

Internet Monitoring and Reporting. Presented by Gerard Louise Technical Support International. What is GMS?. GMS stands for G lobal M anagement S ervices and is a technology that we use to collect logs from Firewall and convert them to meaningful information.

Download Presentation

Internet Monitoring and Reporting

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Internet Monitoring and Reporting Presented by Gerard Louise Technical Support International

  2. What is GMS? • GMS stands for Global Management Services and is a technology that we use to collect logs from Firewall and convert them to meaningful information. • We can display bandwidth use by IP addresses • We can Identify inappropriate Web use • We provide detailed reports of attacks • We collect and aggregate network errors • We show VPN events and problems • We present visitor traffic to a Web site • We provide detailed daily firewall logs to analyze specific events

  3. Bandwidth Summary Report Bandwidth reports display the amount of data transferred through one or more selected SonicWALL appliances. Bandwidth reports are an ideal starting point for viewing overall bandwidth usage. Administrators can view bandwidth usage view by the hour, day or over a period of days. From this information, the organization can determine network strategies. For instance, if the company needs more bandwidth, they might decide to upgrade network equipment, opt to upgrade the bandwidth for their Internet access or they may simply decide to curtail their bandwidth usage for select employees.

  4. Bandwidth Summary Report Bandwidth Report can also be viewed by time of the day and detailed hourly use for each hour.

  5. Top Users of Bandwidth This slide identifies the top users of Internet connectivity in your organization

  6. Top Users of Bandwidth • Another typical example of Top Internet Users

  7. Service Summary Report Service Protocols are specific services and ports used to perform specific functions. For instance, HTTP is used for web browsing, SMTP is used for mail delivery, TCP/3689 are used for Terminal Services. The following graph highlights the type of services used during the period of time defined by the report generator

  8. Service Summary Report

  9. Service Summary Report • The information collected by the report generator in the previous slide can be useful when considering an upgrade of the Internet capabilities at a given site. It is also used to monitor Internet employee usage. In this particular graph, HTTP (web browsing) is using 26.8% of total Internet usage, SMTP (e-Mail) is only 1.4% while Mesh services (File sharing on a peer-to-peer basis) is a huge 55.7%. This indicates that someone at the company is using over 50% of the total resources to download MP3’s or play games.

  10. Summary of Web Usage The Web Usage Summary report contains information on the amount of HTTP bandwidth handled by your SonicWALL device during each hour of the specified day.

  11. Summary of Web Usage • Another representation of web usage (HTTP) on an hourly basis.

  12. Top users for Web

  13. Web Usage Top Sites

  14. Top Visited Web Sites • This graph you to see what are the most “popular” web site in your organization

  15. FTP Monitoring • Other Services such as FTP (File Transfer Protocol can also be monitored

  16. Browse Time per Hour of the Day • Another nice thing you can do with GMS is monitoring the “actual” browse time per time of the day

  17. Browse Time per Hour of the Day

  18. Browse Time TOP users • This graph shows you the TOP Web Browser users in your organization

  19. Browse Time TOP users

  20. E-Mail Summary • Mail usage reports provide information on the amount of mail usage that occurs through the selected SonicWALL appliance's). Mail usage reports can be used to view mail bandwidth usage by the hour, day, or even over a period of days. This report allows an administrator to view the top users of mail bandwidth. Mail usage reports include SMTP, POP3, and IMAP traffic.

  21. E-Mail Summary This graph gives you a better idea of the amount of mail sent and received by time of the day

  22. Top Users of E-Mail

  23. Web Usage per Category • This is one of the best reports you can get from your Sonicwall appliance because it includes many details. You can only get this report if you have the web filtering option installed on the Sonicwall Firewall.

  24. Web Usage per Category

  25. Top Visited Web Sites • This is another report you can get from your Sonicwall appliance because it includes many details. You can only get this report if you have the web filtering option installed on the Sonicwall Firewall.

  26. Top Visited Web Sites

  27. Internet Attack Summary • Attacks reports show the number of attacks that were directed at or through the selected SonicWALL appliances). These include denial of service attacks, intrusions, probes, and all other malicious activity directed at the SonicWALL appliance or computers on the LAN or DMZ. As with any network deployment, SonicWALL recommends taking a multi-layer approach to network security. Through the aid of Attack Summary Reports, network administrators can see evidence of the attacks that have been thwarted using SonicWALL appliances. This will help gauge the effectiveness of the company’s perimeter security device

  28. Internet Attack Summary • This graph shows the attacks on your firewall per time of the day.

  29. Internet Attack Summary • Using this graph, we can identify the type of attacks and in some cases, their provenance.

  30. Virus Attack Summary • To benefit from anti-virus protection and obtain this report, you need to purchase the anti-virus option offered by Sonicwall for all their appliances..

  31. Top Virus Attacks

  32. Firewall Up-Time • We have recorded that this SonicWALL unit has been up 100% of the time and there have been no service disruptions for this report date. This is in alignment your Service Level Agreement (SLA) set forth with your managed services contract.

  33. Thank You! Thank your very much for attending this Web Meeting. Please feel free to contact me if you have any questions. • Gerard Louise • gerard@tsisupport.com • http://www.tsisupport.com/blog/tabid/7657/Default.aspx

More Related