Query The Quarantine Logs; Query The Quarantined Logs - NETGEAR UTM5 Reference Manual

Prosecure unified threat management appliance
Hide thumbs Also See for UTM5:
Table of Contents

Advertisement

Query the Quarantine Logs

The UTM can quarantine spam and malware files. Before you can query the Spam and
Malware logs, you need to have done the following:
1.
You have integrated a ReadyNAS (see
2.
You have configured the quarantine settings (see
page 432).
3.
You have selected to quarantine emails, attachments, objects, and web files on one or
more of the following screens:
Email Anti-Virus screen (see
page 186)
Distributed Spam Analysis screen (see
page 198)
Malware Scan screen (see
FTP screen
Querying and viewing quarantined logs is described in the following sections:

Query the Quarantined Logs

View and Manage the Quarantined Spam Table
View and Manage the Quarantined Infected Files Table
Spam Reports for End Users
Query the Quarantined Logs
To query the quarantine logs:
1.
Select Monitoring > Quarantine. The Quarantine screen displays. (The following figure
shows the Spam log information settings as an example.)
Depending on the selection that you make from the File Type drop-down list, the screen
adjusts to display either the settings for the Spam log or the Malware log.
ProSecure Unified Threat Management (UTM) Appliance
Customize Email Antivirus and Notification Settings
Configure Web Malware Scans
(Configure FTP Scanning
Monitoring System Access and Performance
Connect to a ReadyNAS
Configure the Quarantine Settings
Configure Distributed Spam Analysis
on page 224)
485
on page 431).
on
on
on
on page 202)

Advertisement

Table of Contents
loading

This manual is also suitable for:

Utm9sUtm10Utm150Utm25Utm50

Table of Contents