Netgear UTM25S Reference Manual 3.0.1-124 - Page 512
Block, Delete, Block email, Setting, Description, For the Content filters log: URL, FileType
View all Netgear UTM25S manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 512 highlights
ProSecure Unified Threat Management (UTM) Appliance Table 134. Logs Query screen settings (continued) Setting Search Criteria (continued) Description Category or Categories From the drop-down list, select a category that is queried. You can select the following from the drop-down list: • For the IPS log: an attack. • For the Application log: an instant messaging, peer-to-peer, media, or tool application. Reason Select one or more check boxes to specify the reasons that are queried: You can select one or more of the following check boxes: • For the Email filters log: Keyword, FileType, Filename, Password, and SizeLimit. • For the Content filters log: URL, FileType, SizeLimit, Proxy, and Keyword. Spam Found By This field is available only for the Spam log. Select one of the following check boxes to specify the method by which spam is detected: Blacklist or Distributed Spam Analysis. Malware Name The name of the malware threat that is queried. This field is available only for the Malware log. Action The spam or malware detection action that is queried. The following actions can be selected: • For the Spam log: Select the Block or Tag check box. • For the Malware log: Select the Delete, Block email, or Log check box. Email Subject The email subject that is queried: This field is available for the following logs: Spam and Email filters. Sender Email The sender's email address that is queried. This field is available only for the Traffic log. Recipient Email The recipient's email address that is queried. This field is available for the following logs: Traffic, Spam, Malware, and Email filters. Message The email message text that is queried. This field is available for the following logs: IPS, Anomaly Behavior, and Application. Subject The email subject line that is queried. This field is available only for the Traffic log. Size The minimum and maximum size (in bytes) of the file that is queried. This field is available only for the Traffic log. Monitor System Access and Performance 512