NETGEAR STM150 Appliance Reference Manual page 219

Prosecure web/email security threat management (stm)
Hide thumbs Also See for STM150:
Table of Contents

Advertisement

ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual
Figure 6-15
The Quarantined Spam table shows the following columns:
Checkbox. Lets you select the table entry.
Date. The date that the e-mail was received.
Protocol. The protocol (SMTP, POP3, IMAP) in which the spam was found.
User. The user name that was used to log on the STM.
Client IP. The client IP address from which the spam originated.
From. The e-mail address of the sender.
To. The e-mail address of the recipient.
Subject. The e-mail subject line.
Size (Bytes). The size of the e-mail in bytes.
Figure 6-16
show the Quarantined Spam table with data.
Figure 6-16
After you have selected one or more table entries, take one of the following actions (or click the
Return hyperlink to return to the previous screen):
Send as Spam. The selected spam e-mail files are tagged as spam for Distributed Spam
Analysis, and are sent to the intended recipients.
Monitoring System Access and Performance
v1.0, September 2009
6-37

Advertisement

Table of Contents
loading

This manual is also suitable for:

Stm300Stm600

Table of Contents