ProSecure Web/Email Security Threat Management (STM) Appliance
You can query and view the spam quarantine file and the malware quarantine file separately
and filter the information based on a number of criteria. You can filter the spam quarantine file
using the following criteria:
•
Start date and time
•
End date and time
•
Domain name
•
User name
•
Source IP address
•
Sender email address
•
Recipient email address
•
Subject
•
Size of the email
You can filter the malware quarantine file using the following criteria:
•
Start date and time
•
End date and time
•
Protocols (HTTP, HTTPS, FTP, SMTP, POP3, and IMAP)
•
Domain name
•
User name
•
Malware name
•
Client IP address
•
Recipient email address
•
Recipient email address
•
URL or subject
•
Size of the file
Chapter 6. Monitoring System Access and Performance
| 209