ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual
Figure 6-15
The Quarantined Spam table shows the following columns:
•
Checkbox. Lets you select the table entry.
•
Date. The date that the e-mail was received.
•
Protocol. The protocol (SMTP, POP3, IMAP) in which the spam was found.
•
User. The user name that was used to log on the STM.
•
Client IP. The client IP address from which the spam originated.
•
From. The e-mail address of the sender.
•
To. The e-mail address of the recipient.
•
Subject. The e-mail subject line.
•
Size (Bytes). The size of the e-mail in bytes.
Figure 6-16
show the Quarantined Spam table with data.
Figure 6-16
After you have selected one or more table entries, take one of the following actions (or click the
Return hyperlink to return to the previous screen):
•
Send as Spam. The selected spam e-mail files are tagged as spam for Distributed Spam
Analysis, and are sent to the intended recipients.
Monitoring System Access and Performance
v1.0, September 2009
6-37