NETGEAR UTM5 Reference Manual page 482

Prosecure unified threat management appliance
Hide thumbs Also See for UTM5:
Table of Contents

Advertisement

ProSecure Unified Threat Management (UTM) Appliance
Table 128. Logs Query screen settings (continued)
Setting
Description
Search Criteria
User
(continued)
Client IP
Server IP
Category or
Categories
Reason
Spam Found By This field is available only for the Spam log.
Malware Name
Action
Email Subject
Sender Email
Monitoring System Access and Performance
The user name that is queried.
This field is available for the following logs:
Traffic, Spam, Malware, Email filters, Content filters, and
Application.
The client IP address that is queried.
This field is available for the following logs:
Traffic, Spam, Malware, Content filters, Anomaly Behavior, IPS,
Application.
The server IP address that is queried.
This field is available for the following logs:
Traffic, Malware, Content filters, Anomaly Behavior, IPS,
Application.
From the drop-down list, select a category that is queried.
You can select the following from the drop-down list:
For the IPS log: an attack.
For the Application log: an instant messaging, peer-to-peer,
media, or tool application.
Select one or more check boxes to specify the reasons that are
queried:
You can select one or more of the following check boxes:
For the Email filters log: Keyword, FileType, Filename,
Password, and SizeLimit.
For the Content filters log: URL, FileType, SizeLimit, Proxy,
and Keyword.
Select one of the following check boxes to specify the method
by which spam is detected: Blacklist or Distributed Spam
Analysis.
The name of the malware threat that is queried.
This field is available only for the Malware log.
The spam or malware detection action that is queried.
The following actions can be selected:
For the Spam log: Select the Block or Tag check box.
For the Malware log: Select the Delete, Block email, or
Log check box.
The email subject that is queried:
This field is available for the following logs:
Spam and Email filters.
The sender's email address that is queried.
This field is available only for the Traffic log.
482

Advertisement

Table of Contents
loading

This manual is also suitable for:

Utm9sUtm10Utm150Utm25Utm50

Table of Contents