Netgear STM300EW-100NAS User Manual Page 201

  • Download
  • Add to my manuals
  • Print
  • Page
    / 254
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 200
ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual
Monitoring System Access and Performance 6-25
v1.0, September 2009
Table 6-9. Log Query Settings
Setting Description (or Subfield and Description)
Log Type Select one of the following log types from the pull-down menu:
Traffic. All scanned incoming and outgoing traffic.
Virus. All intercepted viruses.
Spyware. All intercepted spyware.
Spam. All intercepted spam, including spam that was detected through the
blacklist, real-time blacklist, and Distributed Spam Analysis.
Email filters. All e-mails that are intercepted because of keyword, file type, file
name, password, or size limit violations.
Content filters. All Web sites, URLs, and FTP sites that are intercepted because
of Web category, blacklist, file type, or size limit violations.
System. The system event logs that include all system errors, informational
messages, configuration changes, and system software updates.
Application. All intercepted application access violations.
View All Select one of the following radio buttons:
View All. Display or download the entire selected log.
Search Criteria. Query the selected log by configuring the search criteria that are
available for the selected log.
Search Criteria
Start Date/Time From the pull-down menus, select the year, month, day, hours,
and minutes for the start date and time.
This field is available for the following logs:
Traffic, Virus, Spyware, Spam, Email filters, Content filters,
System, and Application.
End Date/Time From the pull-down menus, select the year, month, day, hours,
and minutes for the end date and time.
This field is available for the following logs:
Traffic, Virus, Spyware, Spam, Email filters, Content filters,
System, and Application.
Protocols Select one or more checkboxes to specify the protocols that are
queried.
The following protocols can be selected:
For Traffic, Virus, and Spyware logs: SMTP, POP3, IMAP, HTTP,
FTP, and HTTPS.
For the Spam log: SMTP and POP3.
For the Email filters log: SMTP, POP3, and IMAP.
For the Content filters log: HTTP, FTP, and HTTPS.
User The user name that is queried.
This field is available for the following logs:
Traffic, Virus, Spyware, Spam, Email filters, Content filters, and
Application.
Page view 200
1 2 ... 196 197 198 199 200 201 202 203 204 205 206 ... 253 254

Comments to this Manuals

No comments