Quarantines
10
-
9
4.
Find the subject of the message you wish to open. Next to the subject line content
is the name of the file that corresponds to the original message.
In the example shown in Table 10-2, “Exported query files – example contents,” on
page 10-9, you would first look through the
index.txt
subjects until you found
the one that you were looking for. You would then make note of the file name
associated with it and go back to the unzipped folder and double-click the file of the
same name. The file would then open in the default text editor.
Additional screen actions:
•
Click the
Previous
and
Next
arrows in the top right corner of the table to scroll
through the list of messages.
•
Click the drop-down menu next to
Rows per page
to select the number of entries
to display per screen.
•
Click
Done
to return to the Quarantine Query screen.
Performing Query Maintenance
Performing Quarantine maintenance is very important. The InterScan Gateway Secu-
rity Appliance Quarantine folder can contain a maximum of 1,000,000 email mes-
sages. If you allow the maximum limit to be exceeded, InterScan Gateway Security
Appliance applies the pass action to all new messages that meet the quarantine crite-
ria.
T
ABLE
10-2.
Exported query files – example contents
Example of Contents of an index.txt File
Example of Contents
of an Exported
Quarantine File
File name
Subject line of original message
mail_003.txt
I'm sick today
mail_001.txt
mail_001.txt
Do you like viruses
mail_002.txt
mail_004.txt
Free spam pizza
mail_003.txt
mail_002.txt
Someone wants to meet you
mail_004.txt
mail_005.txt
This is a virus open it
mail_005.txt
Summary of Contents for InterScan M Series
Page 1: ...InterScan TM Gateway Security Appliance M Series...
Page 2: ......
Page 16: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide xiv...
Page 60: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 2 22...
Page 82: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 3 22...
Page 100: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 4 18...
Page 135: ...SMTP Services 5 35 SMTP Content Filtering Target FIGURE 5 20 SMTP Content Filtering Target...
Page 140: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 5 40...
Page 180: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 6 40...
Page 196: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 7 16...
Page 250: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 10 12...
Page 258: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 11 8...
Page 267: ...Analyzing Your Protection Using Logs 12 9...
Page 268: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 12 10...
Page 366: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 15 46...
Page 372: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide A 6...
Page 428: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide B 56...
Page 446: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide D 6...
Page 448: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide E 2...
Page 460: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide G 4...
Page 480: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide I 20...