ProSecure Unified Threat Management (UTM) Appliance Reference Manual

Table 11-15. Logs Query Settings (continued)

Setting

Description (or Subfield and Description)

 

 

 

Log Type

Service Logs. All events that are related to the status of scanning and filtering

(continued)

services that are part of the Application Security main navigation menu. These

 

events include update success messages, update failed messages, network

 

connection errors, and so on.

 

Malware. All intercepted viruses, spyware, and other malware threats.

 

Email filters. All e-mails that are blocked because of file extension and

 

keyword violations.

 

Content filters. All attempts to access blocked Web sites and URLs.

 

IPS. All IPS events.

 

Port Scan. All port scan events.

 

Instant Messaging/Peer to Peer. All instant messaging and peer-to-peer

 

access violations.

 

Firewall. The firewall logs that you have specified on the Firewall Logs screen

 

(see “Configuring and Activating Firewall Logs” on page 11-13).

 

IPSEC VPN. All IPsec VPN events.

 

SSL VPN. All SSL VPN events.

View All

Select one of the following radio buttons:

 

View All. Display or download the entire selected log.

Search Criteria

Search Criteria. Query the selected log by configuring the search criteria that

 

 

are available for the selected log.

 

 

 

 

Start Date/Time

From the pull-down menus, select the year, month, day, hours,

 

 

and minutes for the start date and time.

 

 

This field is available for the following logs:

 

 

Traffic, Spam, Service, Malware, Email filters, Content filters,

 

 

Port Scan, IPS, Instant Messaging/Peer to Peer.

 

 

 

 

End Date/Time

From the pull-down menus, select the year, month, day, hours,

 

 

and minutes for the end date and time.

 

 

This field is available for the following logs:

 

 

Traffic, Spam, Service, Malware, Email filters, Content filters,

 

 

Port Scan, IPS, Instant Messaging/Peer to Peer.

 

 

 

 

Protocols

Select one or more checkboxes to specify the protocols that are

 

 

queried.

 

 

The following protocols can be selected:

 

 

• For Traffic and Malware logs: SMTP, POP3, IMAP, HTTP,

 

 

FTP, and HTTPS.

 

 

• For the Spam log: SMTP and POP3.

 

 

• For the Email filters log: SMTP, POP3, and IMAP.

 

 

• For the Content filters log: HTTP, FTP, and HTTPS.

 

 

 

Monitoring System Access and Performance

11-35

v1.0, January 2010

Page 397
Image 397
NETGEAR UTM5-100NAS manual See Configuring and Activating Firewall Logs on, This field is available for the following logs