NETGEAR STM150 Appliance Reference Manual page 208

Prosecure web/email security threat management (stm)
Hide thumbs Also See for STM150:
Table of Contents

Advertisement

ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual
Table 6-9. Logs Query Settings
Setting
Description (or Subfield and Description)
Search Criteria
User
(continued)
Client IP
Server IP
Reason
Virus Name
Spyware Name
Action
Detected By
Subject
Sender Email
Recipient Email
6-26
<<Reorder Search Criteria rows in table? TBD.>>
The user name that will be queried.
This field is available for the following logs:
Traffic, Virus, Spyware, Spam, Email filters, Content filters, and
Application.
The client IP address that will be queried.
This field is available for the following logs:
Traffic, Virus, Spyware, Spam, Content filters, and Application.
The server IP address that will be queried.
This field is available for the following logs:
Traffic, Virus , Spyware, Content filters, and Application.
Select one or more checkboxes to specify the reason that will be
queried:
The following reasons can be selected:
• For the Email filters log: keyword, file type, file name, password,
and size limit.
• For the Content filters log: Web category, file type, blacklist, and
size limit.
The name of the virus that will be queried.
This field is available only for the Virus log.
The name of the spyware that will be queried.
This field is available only for the Spyware log.
Select one or more checkboxes to specify the malware treatment
actions that will be queried.
The following actions can be selected:
• For the Virus and Spyware logs: delete, quarantine, quarantine
email, block email, or log.
• For the Spam log: block, tag, or quarantine.
Select one or both checkboxes to specify the method by which
spam is detected: Blacklist or Distributed Spam Analysis.
This field is available only for the Spam log.
The e-mail subject that will be queried:
This field is available for the following logs:
Spam and Email filters.
The e-mail address of the sender that will be queried.
This field is available only for the Traffic log.
The e-mail address of the recipient that will be queried.
This field is available for the following logs:
Traffic, Virus, Spyware, Spam, and Email filters.
Monitoring System Access and Performance
v1.0, September 2009

Advertisement

Table of Contents
loading

This manual is also suitable for:

Stm300Stm600

Table of Contents