Query the Quarantine Logs
The UTM can quarantine spam and malware files. Before you can query the Spam and
Malware logs, you need to have done the following:
1.
You have integrated a ReadyNAS (see
2.
You have configured the quarantine settings (see
page 432).
3.
You have selected to quarantine emails, attachments, objects, and web files on one or
more of the following screens:
•
Email Anti-Virus screen (see
page 186)
•
Distributed Spam Analysis screen (see
page 198)
•
Malware Scan screen (see
•
FTP screen
Querying and viewing quarantined logs is described in the following sections:
•
Query the Quarantined Logs
•
View and Manage the Quarantined Spam Table
•
View and Manage the Quarantined Infected Files Table
•
Spam Reports for End Users
Query the Quarantined Logs
To query the quarantine logs:
1.
Select Monitoring > Quarantine. The Quarantine screen displays. (The following figure
shows the Spam log information settings as an example.)
Depending on the selection that you make from the File Type drop-down list, the screen
adjusts to display either the settings for the Spam log or the Malware log.
ProSecure Unified Threat Management (UTM) Appliance
Customize Email Antivirus and Notification Settings
Configure Web Malware Scans
(Configure FTP Scanning
Monitoring System Access and Performance
Connect to a ReadyNAS
Configure the Quarantine Settings
Configure Distributed Spam Analysis
on page 224)
485
on page 431).
on
on
on
on page 202)