ProSecure Unified Threat Management (UTM) Appliance

You can query and generate each type of log separately and filter the information based on a number of criteria. For example, you can filter the malware logs using the following criteria (other log types have similar filtering criteria):

Start date/time and end date/time

Protocols (HTTP, HTTPS, FTP, SMTP, POP3, and IMAP)

Malware name

Action

Domain

User

Client and server IP addresses

Recipient email address

Query and Download Logs

To query and download logs:

1.Select Monitoring > Logs & Reports > Logs Query. The Logs Query screen displays. (The following figure shows the Malware log information settings as an example.) Depending on the selection that you make from the Log Type drop-down list, the screen adjusts to display the settings for the selected type of log.

Figure 301.

Monitor System Access and Performance

509

Page 509
Image 509
NETGEAR STM150EW-100NAS, UTM5EW-100NAS manual Query and Download Logs,  To query and download logs, 509