![NETGEAR STM150 - ProSecure Web And Email Threat Management Appliance Скачать руководство пользователя страница 207](http://html1.mh-extra.com/html/netgear/stm150-prosecure-web-and-email-threat-management-appliance/stm150-prosecure-web-and-email-threat-management-appliance_appliance-reference-manual_1671724207.webp)
ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual
Monitoring System Access and Performance
6-25
v1.0, September 2009
3.
Select the checkboxes and radio buttons, make your selections from the pull-down menus, and
complete the fields as explained in
Table 6-9
.
Table 6-9. Logs Query Settings
<<Reorder Search Criteria rows in table? TBD.>>
Setting
Description (or Subfield and Description)
Log Type
Select one of the following log types from the pull-down menu:
•
Traffic
. All scanned incoming and outgoing traffic.
•
Virus
. All intercepted viruses.
•
Spyware
. All intercepted spyware.
•
Spam
. All intercepted spam, including spam that was detected through the
blacklist, real-time blacklist, and Distributed Spam Analysis.
•
Email filters
. All e-mails that are intercepted because of keyword, file type, file
name, password, or size limit violations.
•
Content filters
. All Web sites, URLs, and FTP sites that are intercepted because
of Web category, blacklist, file type, or size limit violations.
•
System
. The system event logs that include all system errors, informational
messages, configuration changes, and system software updates.
•
Application
. All intercepted application access violations.
View All
Select one of the following radio buttons:
•
View All
. Display or download the entire selected log.
•
Search Criteria
. Query the selected log by configuring the search criteria that are
available for the selected log.
Search Criteria
Start Date/Time
From the pull-down menus, select the year, month, day, hours,
and minutes for the start date and time.
This field is available for the following logs
:
Traffic, Virus, Spyware, Spam, Email filters, Content filters,
System, and Application.
End Date/Time
From the pull-down menus, select the year, month, day, hours,
and minutes for the end date and time.
This field is available for the following logs
:
Traffic, Virus, Spyware, Spam, Email filters, Content filters,
System, and Application.
Protocols
Select one or more checkboxes to specify the protocols that will
be queried.
The following protocols can be selected
:
• For Traffic, Virus, and Spyware logs: SMTP, POP3, IMAP, HTTP,
FTP, and HTTPS.
• For the Spam log: SMTP and POP3.
• For the Email filters log: SMTP, POP3, and IMAP.
• For the Content filters log: HTTP, FTP, and HTTPS.
DRAFT
Содержание STM150 - ProSecure Web And Email Threat Management Appliance
Страница 6: ...v1 0 September 2009 vi D R A F T ...