User's Manual
Table Of Contents
- ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual
- Contents
- About This Manual
- Chapter 1 Introduction
- Chapter 2 Using the Setup Wizard to Provision the STM in Your Network
- Choosing a Deployment Scenario
- Understanding the Steps for Initial Connection
- Logging In to the STM
- Using the Setup Wizard to Perform the Initial Configuration
- Setup Wizard Step 1 of 10: Introduction
- Setup Wizard Step 2 of 11: Networking Settings
- Setup Wizard Step 3 of 11: Time Zone
- Setup Wizard Step 4 of 11: Email Security
- Setup Wizard Step 5 of 11: Web Security
- Setup Wizard Step 6 of 11: Email Notification Server Settings
- Setup Wizard Step 7 of 11: Update Settings
- Setup Wizard Step 8 of 11: HTTP Proxy Settings
- Setup Wizard Step 9 of 11: Web Categories
- Setup Wizard Step 10 of 11: Configuration Summary
- Setup Wizard Step 11 of 11: Restarting the System
- Verifying Proper Installation
- Registering the STM with NETGEAR
- What to Do Next
- Chapter 3 Performing Network and System Management
- Configuring Network Settings
- Configuring Session Limits and Timeouts
- Configuring the HTTP Proxy Settings
- About Users with Administrative and Guest Privileges
- Configuring Remote Management Access
- Using an SNMP Manager
- Managing the Configuration File
- Updating the Software
- Configuring Date and Time Service
- Managing Digital Certificates
- Managing the Quarantine Settings
- Performance Management
- Chapter 4 Content Filtering and Optimizing Scans
- About Content Filtering and Scans
- Configuring E-mail Protection
- Configuring Web and Services Protection
- Configuring Application Control
- Setting Scanning Exclusions and Web Access Exceptions
- Chapter 5 Managing Users, Groups, and Authentication
- About Users, Groups, and Domains
- Configuring Groups
- Configuring User Accounts
- Configuring Authentication
- Global User Settings
- Viewing and Logging Out Active Users
- Chapter 6 Monitoring System Access and Performance
- Chapter 7 Troubleshooting and Using Online Support
- Appendix A Default Settings and Technical Specifications
- Appendix B Related Documents
- Index

Index-1
v2.0, February 2007
Index
Numerics
10BaseT, 100BaseT, and 1000BaseT 3-4
A
AC input
STM150 1-14
STM300 1-15
STM600 1-15
access
preventing inherited privileges 5-11
read/write and read-only 3-9
remote management 3-11
action buttons (Web Management Interface) 2-8
activating, service licenses 1-6, 2-28
Active Directory (AD)
domains 5-16
how it works 5-12
overview 5-11
ActiveX objects 4-3
administrator (admin)
overview 3-9
receiving
alerts by e-mail 6-8
logs by e-mail 6-4
reports by e-mail 6-33
settings 3-10
airflow 1-17
alerts
e-mail address for sending alerts 6-2
specifying alerts to send via e-mail 6-8
Alexa Toolbar 4-3, 4-46
allowing
e-mails 4-17
URLs 4-34
Web
access exceptions 4-49
categories 2-25, 4-30
anti-spam settings, backing up 3-16
anti-virus
action if infected e-mails 2-15
user notification settings 4-10
application software, updating 3-19
applications
control 4-44
logs 6-5, 6-6, 6-22, 6-25
recent 5 and top 5 violations 6-15
reports 6-29, 6-33
setting access exceptions 4-52
status 6-13
attached devices, monitoring with SNMP 3-13
audio and video files
e-mail filtering 4-14
FTP filtering 4-43
Web
filtering 4-30
authenticated users 4-50
authentication methods 5-11
Auto Uplink 1-4
autosensing, speed 3-4
B
backing up, settings 3-16, 3-17
BitTorrent 4-2, 4-46
blacklist
e-mails 4-15
URLs 4-34
blocking
e-mails 4-17
file extensions 4-11, 4-14, 4-26, 4-30, 4-43
file names 4-11, 4-14