ProSecure Unified Threat Management (UTM) Appliance
View and Manage the Quarantined Spam Table
When you query the spam quarantine file, the Quarantine screen with the Quarantined Spam
table displays:
Figure 280.
The Quarantined Spam table has the following columns (not all columns are shown in the
previous figure):
•
Check box. Lets you select the table entry.
•
Date. The date that the email was received.
•
Protocol. The protocol (SMTP) in which the spam was found.
•
Domain. The domain in which the spam was found.
•
User. The user name that was used to log in to the UTM.
•
Client IP. The client IP address from which the spam originated.
•
From. The email address of the sender.
•
To. The email address of the recipient.
•
Subject. The email subject line.
•
Size (Bytes). The size of the email in bytes.
Monitoring System Access and Performance
470