Spam Logs - NETGEAR UTM5EW-100NAS Appliance Reference Manual

Unified threat management
Table of Contents

Advertisement

Table C-18. Content Filtering and Security Logs: Web Filtering and Content Filtering
Message
Explanation
Recommended Action
Message
Explanation
Recommended Action

Spam Logs

This section describes logs that are generated when the UTM filters spam e-mail messages.
Table C-19. Content Filtering and Security Logs: Spam
Message
Explanation
Recommended Action
Message
Explanation
Recommended Action
System Logs and Error Messages
ProSecure Unified Threat Management (UTM) Appliance Reference Manual
2009-08-01 00:00:01 HTTP 192.168.1.3 192.168.35.165
http://192.168.35.165/testcases/files/virus/normal/%b4%f3%d3%da2048.rar
Proxy Block
Logs that are generated when Web content is blocked because it uses a proxy.
The message shows the date and time, protocol, client IP address, server IP
address, URL, reason for the action, and action that is taken.
None
2009-08-01 00:00:01 HTTP 192.168.1.3 192.168.35.165
http://192.168.35.165/testcases/files/virus/normal/%b4%f3%d3%da2048.rar
Keyword Block
Logs that are generated when Web content is blocked because it violates a
blocked keyword. The message shows the date and time, protocol, client IP
address, server IP address, URL, reason for the action, and action that is
taken.
None
2009-02-28 23:59:59 SMTP 192.168.1.2 192.168.35.165
xlzimap@test.com xlzpop3@test.com Blocked by customized blacklist. 0
RBL Block
Logs that are generated when spam messages are blocked by the RBL. The
message shows the date and time, protocol, client IP address, server IP
address, sender, recipient, subject line, mechanism that detected the spam,
and action that is taken.
None
2009-02-28 23:59:59 SMTP 192.168.1.2 192.168.35.165
xlzimap@test.com xlzpop3@test.com Blocked by customized blacklist. 0
Heuristic Block
Logs that are generated when spam messages are blocked by Distributed
Spam Analysis. The message shows the date and time, protocol, client IP
address, server IP address, sender, recipient, subject line, mechanism that
detected the spam, and action that is taken.
None
v1.0, January 2010
C-13

Advertisement

Table of Contents
loading

This manual is also suitable for:

Prosecure

Table of Contents