Trend Micro™ InterScan™ Gateway Security Appliance M-Series Administrator’s Guide
12
-
6
feature, logs will be created in both the local log database and the syslog server. Logs
generated before enabling the syslog server feature will not be copied to the syslog
server.
Note:
Log events that are stored on the remote device cannot be queried or maintained
from the InterScan Gateway Security Appliance Web console.
When the InterScan Gateway Security Appliance is operating in diskless mode,
logs will not be created on the local machine, but if the syslog server feature is
enabled, logs will be created on the remote machine.
To configure Log Settings:
1.
From the left-side menu, click
Logs > Settings.
2.
Select the Send logs to syslog server check box.
3.
Enter the syslog server's IP address and port number in the IP address and Port
fields.
4.
Click Save.
To configure Log Options (to disable logging):
1.
From the left-side menu, click
Logs > Settings.
2.
Clear one or more of the following items to disable logging of those features:
•
Anti-Spam: Content Scanning
•
Anti-Spam: Email Reputation Services
•
URL filtering
•
Global URL blocked list
3.
Click
Save
.
Configuring Log Maintenance
Configuring log maintenance is a two-step process. First, select the type of logs to
delete (Target tab). Next, set the action that InterScan Gateway Security Appliance
should take on the selected logs (Action tab). From the Log Maintenance screen you
can configure both Manual and Automatic log maintenance.
Summary of Contents for InterScan M Series
Page 1: ...InterScan TM Gateway Security Appliance M Series...
Page 2: ......
Page 16: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide xiv...
Page 60: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 2 22...
Page 82: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 3 22...
Page 100: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 4 18...
Page 135: ...SMTP Services 5 35 SMTP Content Filtering Target FIGURE 5 20 SMTP Content Filtering Target...
Page 140: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 5 40...
Page 180: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 6 40...
Page 196: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 7 16...
Page 250: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 10 12...
Page 258: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 11 8...
Page 267: ...Analyzing Your Protection Using Logs 12 9...
Page 268: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 12 10...
Page 366: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 15 46...
Page 372: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide A 6...
Page 428: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide B 56...
Page 446: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide D 6...
Page 448: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide E 2...
Page 460: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide G 4...
Page 480: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide I 20...