Netgear STM150 User Manual Page 509

  • Download
  • Add to my manuals
  • Print
  • Page
    / 704
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 508
Monitor System Access and Performance
509
ProSecure Unified Threat Management (UTM) Appliance
You can query and generate each type of log separately and filter the information based on a
number of criteria. For example, you can filter the malware logs using the following criteria
(other log types have similar filtering criteria):
Start date/time and end date/time
Protocols (HTTP, HTTPS, FTP, SMTP, POP3, and IMAP)
Malware name
Action
Domain
User
Client and server IP addresses
Recipient email address
Query and Download Logs
To query and download logs:
1. Select Monitoring > Logs & Reports > Logs Query. The Logs Query screen displays.
(The following figure shows the Malware log information settings as an example.)
Depending on the selection that you make from the Log Type drop-down list, the screen
adjusts to display the settings for the selected type of log.
Figure 301.
Page view 508
1 2 ... 504 505 506 507 508 509 510 511 512 513 514 ... 703 704

Comments to this Manuals

No comments