NETGEAR UTM5 Reference Manual page 480

Prosecure unified threat management appliance
Hide thumbs Also See for UTM5:
Table of Contents

Advertisement

ProSecure Unified Threat Management (UTM) Appliance
Figure 288.
2.
Enter the settings as explained in the following table:
Table 128. Logs Query screen settings
Setting
Log Type
Description
Select one of the following log types from the drop-down list:
Traffic. All scanned incoming and outgoing traffic.
Spam. All intercepted spam.
System. The system event logs that you have specified on the Email and
Syslog screen (see
Configure and Activate System, Email, and Syslog Logs
on page 439). However, by default, many more types of events are logged in
the system logs. Note that you cannot specify further search criteria on the
Log Query screen, that is, when you select System from the drop-down list,
the System Logs screen displays.
Service Logs. All events that are related to the status of scanning and
filtering services that you access from the Application Security main
navigation menu. These events include update success messages, update
failed messages, network connection errors, and so on.
Malware. All intercepted viruses, spyware, and other malware threats.
Monitoring System Access and Performance
480

Advertisement

Table of Contents
loading

This manual is also suitable for:

Utm9sUtm10Utm150Utm25Utm50

Table of Contents