Query And Download Logs - NETGEAR UTM9S Reference Manual

Prosecure unified threat management (utm) appliance
Hide thumbs Also See for UTM9S:
Table of Contents

Advertisement

Firewall. The firewall logs that you have specified on the Firewall Logs screen (see
Configure and Activate Firewall Logs
IPSec VPN. All IPSec VPN events.
SSL VPN. All SSL VPN events.
You can query and generate each type of log separately and filter the information based on a
number of criteria. For example, you can filter the malware logs using the following criteria
(other log types have similar filtering criteria):
Start date/time and end date/time
Protocols (HTTP, HTTPS, FTP, SMTP, POP3, and IMAP)
Malware name
Action
Domain
User
Client and server IP addresses
Recipient email address
Querying logs is described in the following sections:

Query and Download Logs

Example: Use the Logs to Identify Infected Clients
Log Management
Query and Download Logs
To query and download logs:
1.
Select Monitoring > Logs & Reports > Logs Query. The Logs Query screen displays.
(The following figure shows the Malware log information settings as an example.)
Depending on the selection that you make from the Log Type drop-down list, the screen
adjusts to display the settings for the selected type of log.
ProSecure Unified Threat Management (UTM) Appliance
Monitoring System Access and Performance
on page 432).
461

Advertisement

Table of Contents
loading

Table of Contents