NETGEAR UTM5 Reference Manual page 487

Prosecure unified threat management appliance
Hide thumbs Also See for UTM5:
Table of Contents

Advertisement

ProSecure Unified Threat Management (UTM) Appliance
Table 129. Quarantine screen settings (continued)
Setting
Search Criteria
(continued)
Display
3.
Click Search. The log is queried according to the search criteria that you specified, and the
search results are displayed onscreen.
Description
Protocols
For the Malware log only, select one or more check boxes to
specify the protocols that are queried: SMTP, POP3, IMAP,
HTTP, FTP, and HTTPS.
Domain
The domain name that is queried.
This field is available for both the Spam and Malware logs.
User
The user name that is queried.
This field is available for both the Spam and Malware logs.
Malware Name
The name of the malware threat that is queried.
This field is available only for the Malware log.
Client IP
The client IP address that is queried.
This field is available for both the Spam and Malware logs.
Sender Email
The sender's email address that is queried.
This field is available only for the Spam log.
Recipient Email
The recipient's email address that is queried.
This field is available for both the Spam and Malware logs.
Subject
The email subject line that is queried.
This field is available for both the Spam and Malware logs.
Size
The minimum and maximum size (in bytes) of the file that is
queried.
This field is available for both the Spam and Malware logs.
The maximum number of pages that is displayed.
Monitoring System Access and Performance
487

Advertisement

Table of Contents
loading

This manual is also suitable for:

Utm9sUtm10Utm150Utm25Utm50

Table of Contents