Configure Scheduled Threat Analysis

Scheduled Threat Analysis is an email that consists of a list of sites and the number of requests identified as threats, per machine. This email can be automatically generated and sent at scheduled intervals.

Configure the Threat Analysis Email settings

To be able to configure the threat analysis email, Access Control for the system settings needs to be enabled in your user account.

  Access to the features are defined by your user permissions. If your user account does not have the required access permissions, you will not be able to access certain features. For more information, contact your administrator.

Enable or disable Scheduled Threat Analysis

  1. Navigate to the Reports menu. The Reports page is displayed.

  2. Select the Scheduled Threat Analysis tab.

  3. In the Scheduled Threat Analysis Email panel, click Click here to change these settings.

  4. Select the Enable the Scheduled Threat Analysis Email check box to enable the feature. If you do not wish to use the feature, leave the check box unselected.

  5. Click Save.

Sender & Recipient

  1. In the Sender & Recipient panel, click Click here to change these settings.

  2. Specify the sender and recipient of the threat analysis email, using the drop-down menus.

    From

    • Administrator: This is a default option.

    • Server

    • This email address: If a specific email address is required, enter it manually.

    To

    • Server Administrator: This is a default option.

    • This email address: If a specific email address is required, enter it manually.

      By default, the sender and recipient email address are both configured as the server administrator's email address.

Schedule

The schedule determines the times at which Secure Web Gateway issues the threat analysis email.

  1. In the Schedule panel, click Click here to change these settings.

  2. Select a time slot on the schedule table. The table displays the days and times of the week, using the following icons:

    • Full Threat Analysis: Issues an email, listing all threats.

    • New Threat Analysis: Issues an email, listing new threats.

    • Clear: No email is issued (no threat analysis).

      Click the same time slot to cycle through these options.

When you have finished setting up Scheduled Threat Analysis, apply the configuration.

 

If you change any configuration or policy settings, you must Apply Configuration for the new settings to take effect. You can do this either from the Changes Made panel, or System > ConfigurationApply Configuration. See Apply new configuration for more information.

If you use Peer Gateways (i.e. when multiple Gateways are peered), any configuration changes from a local Gateway can then be applied to all the peers at the same time. See Configure Peer Gateways for more information.