ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual
Note: To specify the quarantine settings, see
page
3-31.
You can query and view the spam quarantine file and the malware quarantine file separately and
filter the information based on a number of criteria. You can filter the spam quarantine file using
the following criteria:
•
Start date and time
•
End date and time
•
User name
•
Source IP address
•
Sender e-mail address
•
Recipient e-mail address
•
Subject
•
Size of the e-mail
You can filter the malware quarantine file using the following criteria:
•
Start date and time
•
End date and time
•
Protocols (SMTP, POP3, IMAP, HTTP, FTP, HTTPS)
•
User name
•
Malware name
•
Client IP address
•
Recipient e-mail address
•
Recipient e-mail address
•
URL or subject
•
Size of the file
To query the quarantine files:
1. Select Monitoring > Quarantine from the menu. The Quarantine screen displays (see
Figure 6-14 on page
6-34
6-35).
v1.0, September 2009
"Managing the Quarantine Settings" on
Monitoring System Access and Performance