.
Figure 63. Content Filtering, screen 3 of 3
3.
Complete the fields, select the check boxes, and make your selections from the drop-down
lists as explained in the following table:
Table 34. Content Filtering Settings
Setting
Content Filtering
Log HTTP Traffic
112 |
Chapter 4. Content Filtering and Optimizing Scans
ProSecure Web/Email Security Threat Management (STM) Appliance
Description
Select this check box to log HTTP traffic. For information about how to view the logged
traffic, see
Querying Logs
on page
Note:
Logging HTTP traffic might affect the STM's performance (see
STM's Performance
on page 82).
194.
By default, HTTP traffic is not logged.
Managing the