310
D.1
List of Mail Log Variables
You can use the following macros to specify what kind of information is
collected from different events in the F-Secure Anti-Virus for Internet Mail
mail log.
Macro
For which events
Description
$DATETIME
All
The date and time when the event occurred
$EVENT
All
Event type, one of the following:
Received
,
Scanned
,
Sent
,
Trashed
,
Rejected
,
Failure
,
Error
.
$JOBID
All except Rejected
Unique job ID as assigned by F-Secure Anti-Virus
for Internet Mail.
$MSGID
All except Rejected
The message ID from the mail message header.
$HOST
Received, Rejected
The IP address of the host that the mail message
was received from.
$FROM
Received, Scanned,
Sent, Trashed
The complete mail sender address as given in the
mail envelope (i.e. SMTP "MAIL FROM" command).
$TO
Received, Scanned,
Sent, Trashed
The mail recipient address(es) as given in the mail
envelope (i.e. SMTP "RCPT TO" command).
$SIZE
Received, Scanned,
Sent, Trashed
The original mail size (in bytes).
$DIRECTION
All except Failure or
Error
Mail direction: inbound or outbound. If the mail
message was received from a host specified in the
Intranet Hosts table, the mail is considered to be
outbound. Otherwise, the mail message is
considered to be inbound.
$SCANRES
Scanned
The result of scanning the mail message for viruses
and disallowed content.
$SPAMCHECK
Scanned
The result of spam analysis (if available).
Содержание INTERNET GATEKEEPER WINDOWS 2000-2003 SERVER 6.61...
Страница 1: ...F Secure Internet Gatekeeper Windows 2000 2003 Server Administrator s Guide...
Страница 10: ...10 ABOUT THIS GUIDE How This Guide is Organized 11 Conventions Used in F Secure Guides 13...
Страница 26: ...26 2 DEPLOYMENT Overview 27 Deployment Scenarios 29...
Страница 58: ...58 Step 10 Enter the IP address of the F Secure Policy Manager Server Click Next to continue...
Страница 200: ...200 Figure 6 17 Summary of SMTP scanning statistics in F Secure Internet Gatekeeper Web Console...
Страница 251: ...251 9 ADMINISTERING F SECURE MANAGEMENT AGENT F Secure Management Agent Settings 252 Configuring Alert Forwarding 254...
Страница 261: ...CHAPTER10 261 Quarantine Management Figure 10 1 Quarantine Query page...
Страница 275: ...275 11 SECURITY AND PERFORMANCE Introduction 276 Optimizing Security 276 Optimizing Performance 277...
Страница 280: ...280 12 UPDATING VIRUS AND SPAM DEFINITION DATABASES Overview 281 Automatic Updates 281 Configuring Automatic Updates 282...
Страница 296: ...296 A APPENDIX Warning Messages HTTP Warning Messages 297 SMTP Warning Messages 298...
Страница 300: ...300 B APPENDIX Specifying Hosts Introduction 301 Domain 301 Subnet 301 IP Address 302 Hostname 302...
Страница 304: ...304 C APPENDIX Access Log Variables List of Access Log Variables 305...
Страница 309: ...309 D APPENDIX Mail Log Variables List of Mail Log Variables 310...
Страница 312: ...312 E APPENDIX Configuring Mail Servers Configuring the Network 313 Configuring Mail Servers 314...
Страница 318: ...318 6 Change the TCP port to some other unused port for example 26 7 Click OK for all the windows and reboot the server...
Страница 360: ...360 G APPENDIX Services and Processes List of Services and Processes 361...
Страница 414: ...414...