ProSecure Unified Threat Management UTM10 or UTM25 Reference Manual
Figure 11-23
3. Enter the settings as explained in
Table 11-15. Logs Query Settings
Setting
Log Type
11-34
Table
11-15.
Description (or Subfield and Description)
Select one of the following log types from the pull-down menu:
• Traffic. All scanned incoming and outgoing traffic.
• Spam. All intercepted spam.
• System. The system event logs that you have specified in the System Logs
Options section at the top of the screen. However, by default, many more types
of events are logged in the system logs.
v1.0, September 2009
Monitoring System Access and Performance