NETGEAR UTM25-100NAS - Prosecure Utm Appliance 25U No Sub Included Reference Manual page 393

Prosecure unified threat management
Table of Contents

Advertisement

ProSecure Unified Threat Management UTM10 or UTM25 Reference Manual
Table 11-15. Logs Query Settings (continued)
Setting
Log Type
(continued)
View All
Search Criteria
Monitoring System Access and Performance
Description (or Subfield and Description)
• Service Logs. All events that are related to the status of scanning and filtering
services that are part of the Application Security main navigation menu. These
events include update success messages, update failed messages, network
connection errors, and so on.
• Malware. All intercepted viruses, spyware, and other malware threats.
• Email filters. All e-mails that are blocked because of file extension and
keyword violations.
• Content filters. All attempts to access blocked Web sites and URLs.
• IPS. All IPS events.
• Port Scan. All port scan events.
• Instant Messaging/Peer to Peer. All instant messaging and peer-to-peer
access violations.
• Firewall. The firewall logs that you have specified on the Firewall Logs screen
(see
"Configuring and Activating Firewall Logs" on page
• IPSEC VPN. All IPsec VPN events.
• SSL VPN. All SSL VPN events.
Select one of the following radio buttons:
• View All. Display or download the entire selected log.
• Search Criteria. Query the selected log by configuring the search criteria that
are available for the selected log.
Start Date/Time From the pull-down menus, select the year, month, day, hours,
and minutes for the start date and time.
This field is available for the following logs:
Traffic, Spam, Service, Malware, Email filters, Content filters,
Port Scan, IPS, Instant Messaging/Peer to Peer.
End Date/Time
From the pull-down menus, select the year, month, day, hours,
and minutes for the end date and time.
This field is available for the following logs:
Traffic, Spam, Service, Malware, Email filters, Content filters,
Port Scan, IPS, Instant Messaging/Peer to Peer.
Protocols
Select one or more checkboxes to specify the protocols that are
queried.
The following protocols can be selected:
• For Traffic and Malware logs: SMTP, POP3, IMAP, HTTP,
FTP, and HTTPS.
• For the Spam log: SMTP and POP3.
• For the Email filters log: SMTP, POP3, and IMAP.
• For the Content filters log: HTTP, FTP, and HTTPS.
v1.0, September 2009
11-13).
11-35

Advertisement

Table of Contents
loading

This manual is also suitable for:

Prosecure utm10Prosecure utm25

Table of Contents