Export (0) Print
Expand All

Reports

Updated: February 1, 2011

Applies To: Forefront Threat Management Gateway (TMG)

You can customize content to include in a report. Forefront TMG also provides the following predefined report categories that you can use or modify if required:

  • Summary. A Summary content report includes summarized information about network traffic usage, sorted by application. These reports are most relevant to the network administrator or the person managing or planning a company's Internet connectivity.

  • Web Usage. A Web Usage content report displays information about frequent Web users, common responses, and browsers. These reports are most relevant to the network administrator or the person managing or planning a company's Internet connectivity. It shows how the Web is being used in a company.

  • Application Usage. An Application Usage content report illustrates Internet application usage information about top users, client applications, and destinations.

  • Traffic and Utilization. A Traffic and Utilization content report shows total Internet usage by application, protocol, and direction. These reports also show average traffic and peak simultaneous connections, cache hit ratio, errors, and other statistics.

  • Security. A Security content report lists attempts to breach network security.

  • Malware Protection. A Malware Inspection content report shows the names of current threats, the users and Web sites that generate the largest number of Malware incidents, and statistics regarding the Malware filter and a daily summary of Malware activity.

  • URL Filtering. A URL filtering content report lists Forefront TMG URL filtering activity.

  • Network Inspection System. A network inspection system content report lists Forefront TMG network inspection activity.

You can customize the different report categories and specify a sort order with the following types of criteria.

 

Report Subcategory Report Subcategory Description Report Category

Authorization failures

Authorization failures occur when a user is not granted permission for a specific request. You can limit the report to include users who cause the most authorization failures.

Security

Cache Performance

Cache hit ratio is the ratio between the number of objects requested and the number of objects returned from the cache.

Summary

Traffic and Utilization

Connections

Summarizes the peak number of simultaneous connections during each day of the report period.

Traffic and Utilization

Daily Traffic

Summarizes the average network traffic through Forefront TMG at various times during the day. This report includes both Web and non-Web traffic.

Summary

Traffic and Utilization

Dropped packets

A packet is dropped when a client request is denied. You can limit the report to include data for clients who generate the most dropped packets.

Security

Errors

Forefront TMG encountered the following failures communicating with other computers during the report period.

Traffic and Utilization

General Statistics

General statistics summarizing Forefront TMG activity during the report period.

Summary

HTTP Responses

How Forefront TMG responded to HTTP requests during the report period.

Web Usage

Inspection Statistics

General statistics summarizing the HTTP Malware Protection during the report period.

Malware Protection

Inspection Times

The report shows the Web sites for which client downloads required the longest average inspection time.

Malware Protection

Object Types

You can limit the report to include data for the objects most frequently delivered by Forefront TMG in response to client requests during the report period.

Web Usage

Processing Time

Summarizes the average request processing time during the each day of the report period.

Traffic and Utilization

Top Application Protocols

Communication protocols carry network traffic through Forefront TMG. You can limit the report to include data for the protocols used most by clients.

Application Usage

Top Application Users

You can limit the report to include data for the users who generated the most traffic through Forefront TMGduring the report period.

Application Usage

Top Applications

You can limit the report to include data for the applications that generated the largest amounts of network traffic during the report period.

Application Usage

Top Attacks

The report shows the intrusion attempts that were most frequently encountered by the Network Inspection System during the report period.

Network Inspection System

Top Destinations

When a client makes a request, the destination is included in the request. You can limit the report to include data for the most requested destinations.

Application Usage

Top Protocols

The report shows the protocols most used to carry network traffic through Forefront TMG during the report period.

Summary

Traffic and Utilization

Network Inspection System

Top Restricted URL Categories

Restricted categories are URL Categories for which users should not have access according to the Firewall policy. You can limit the Report to include the restricted Categories for which access attempts were most frequent during the Report period.

URL Filtering

Top Restricted Web sites

Restricted Web sites are sites for which users should not have access according to the Firewall policy. You can limit the Report to include the restricted Web sites for which access attempts were most frequent during the report period.

URL Filtering

Top URL Categories

You can limit the Report to include data for the URL categories which were most frequently accessed during the report period.

URL Filtering

Top Threats

The report shows the threats that were most frequently encountered by the HTTP Malware Inspection filter during the report period.

Malware Inspection

Top Users

You can limit the report to include data for the users who generated the most traffic through Forefront TMG during the report period.

Summary

Malware Protection

URL Filtering

Top Web Protocols

Communication protocols carry network traffic through Forefront TMG. You can limit the report to include data for the protocols used most by clients when accessing Web sites.

Web Usage

Top Web Sites

You can limit the report to include the Web sites most frequently accessed during the report period.

Summary

Malware Protection

Top Web Users

You can limit the report to include data for the users who generated the most traffic through Forefront TMG during the report period.

Web Usage

Traffic

Summarizes the amount of network traffic, by date, sent through Forefront TMG. This report includes both Web and non-Web traffic.

Summary

Traffic and Utilization

URL Filtering Statistics

General statistics summarizing the URL Filtering during the report type.

URL Filtering

You can create the following reports from the log summaries:

  • One-time report.

  • Recurring report.

For information on how to generate reports, see Creating reports.

Related Topics

Was this page helpful?
(1500 characters remaining)
Thank you for your feedback
Show:
© 2014 Microsoft