CHAPTER 6
195
Administering F-Secure Anti-Virus for Internet Mail
6.4
Monitoring Logs
F-Secure Anti-Virus for Internet Mail maintains extensive logs. All the
e-mails that pass through F-Secure Anti-Virus for Internet Mail are logged
in Mail Log.
F-Secure Management Agent maintains Logfile.log that contains all alerts
generated by F-Secure components installed on the host. These logs are
described below.
Mail Log
You can set F-Secure Anti-Virus for Internet Mail to keep log of all the
e-mails that pass through it.
The mail logs are by default created under the F-Secure Anti-Virus for
Internet Mail installation directory. They can be viewed with any text
editor, for example Windows Notepad. You can also open the mail log
from the F-Secure Internet Gatekeeper Web Console by selecting the
F-Secure Anti-Virus for Internet Mail
tab and clicking
Show Mail Log
button on the
Summary
page.
The mail log contains information about received, scanned, sent, trashed,
rejected and failed e-mails and about permanent errors when scanning
mail. The mail log entries generated for these mails are described in detail
below.
Received Entry
The Received Entry is added to the log when a mail has been accepted
from another mail transfer agent or mail client and F-Secure Anti-Virus for
Internet Mail has successfully written it to disk. At this point F-Secure
Anti-Virus for Internet Mail takes over the processing of the mail.
The Received Entry includes the time of receiving, the job name (the
name of the spool file), the message ID, the network address of the host
that sent the mail, the ‘From’ field from the SMTP envelope, the ‘To’ field
from the SMTP envelope, the size of the message (in bytes, including
headers) and message direction (inbound or outbound).
Summary of Contents for INTERNET GATEKEEPER WINDOWS 2000-2003 SERVER 6.61...
Page 1: ...F Secure Internet Gatekeeper Windows 2000 2003 Server Administrator s Guide...
Page 10: ...10 ABOUT THIS GUIDE How This Guide is Organized 11 Conventions Used in F Secure Guides 13...
Page 26: ...26 2 DEPLOYMENT Overview 27 Deployment Scenarios 29...
Page 58: ...58 Step 10 Enter the IP address of the F Secure Policy Manager Server Click Next to continue...
Page 261: ...CHAPTER10 261 Quarantine Management Figure 10 1 Quarantine Query page...
Page 296: ...296 A APPENDIX Warning Messages HTTP Warning Messages 297 SMTP Warning Messages 298...
Page 304: ...304 C APPENDIX Access Log Variables List of Access Log Variables 305...
Page 309: ...309 D APPENDIX Mail Log Variables List of Mail Log Variables 310...
Page 360: ...360 G APPENDIX Services and Processes List of Services and Processes 361...
Page 414: ...414...