NETGEAR STM150 - ProSecure Web And Email Threat Management Appliance Reference Manual page 197

Web/email security threat management appliance
Hide thumbs Also See for STM150 - ProSecure Web And Email Threat Management Appliance:
Table of Contents

Advertisement

ProSecure Web/Email Security Threat Management (STM) Appliance
Table 58. Log Query Settings (Continued)
Setting
Search Criteria
(continued)
Description (or Subfield and Description)
Domain
The domain name that is queried.
This field is available for the following logs:
Email traffic, Web traffic, Virus, Spyware, Spam, Email filters, Content
filters, and Application.
User
The user name that is queried.
This field is available for the following logs:
Email traffic, Web traffic, Virus, Spyware, Spam, Email filters, Content
filters, and Application.
Client IP
The client IP address that is queried.
This field is available for the following logs:
Email traffic, Web traffic, Virus, Spyware, Spam, Content filters, and
Application.
Server IP
The server IP address that is queried.
This field is available for the following logs:
Email traffic, Web traffic, Virus, Spyware, Content filters, and
Application.
Reason
Select one or more check boxes to specify the reasons that are
queried:
The following reasons can be selected:
• For the Email filters log: keyword, file type, file name, password, and
size limit.
• For the Content filters log: Web category, file type, blacklist, and size
limit.
Virus Name
The name of the virus that is queried.
This field is available only for the Virus log.
Spyware Name
The name of the spyware that is queried.
This field is available only for the Spyware log.
Action
Select one or more check boxes to specify the malware treatment
actions that are queried.
The following actions can be selected:
• For the Virus and Spyware logs: Delete, Quarantine, Quarantine
email, Block email, or Log.
• For the Spam log: Block, Tag, or Quarantine.
Detected By
Select one or all check boxes to specify the method by which spam is
detected: Blacklist, RBL, or Distributed Spam Analysis.
This field is available only for the Spam log.
Subject
The email subject that is queried:
This field is available for the following logs:
Email traffic, Spam, and Email filters.
Sender Email
The email address of the sender that is queried.
This field is available only for the Email traffic log.
Chapter 6. Monitoring System Access and Performance
| 197

Advertisement

Table of Contents
loading

This manual is also suitable for:

Prosecure stm300Prosecure stm600

Table of Contents