ProSecure Unified Threat Management (UTM) Appliance

Table 134. Logs Query screen settings (continued)

Setting

Description

 

 

 

View All

Select one of the following radio buttons:

 

View All. Display or download the entire selected log.

Search Criteria

Search Criteria. Query the selected log by configuring the search criteria that

are available for the selected log.

 

 

 

 

 

Start Date/Time

From the drop-down lists, select the year, month, day, hours,

 

 

and minutes for the start date and time.

 

 

This field is available for the following logs:

 

 

Traffic, Spam, System, Service, Malware, Email filters, Content

 

 

filters, IPS, Anomaly Behavior, Application, Firewall, IPSec

 

 

VPN, SSL VPN, and HTTPS Smart Block.

 

End Date/Time

From the drop-down lists, select the year, month, day, hours,

 

 

and minutes for the end date and time.

 

 

This field is available for the following logs:

 

 

Traffic, Spam, System, Service, Malware, Email filters, Content

 

 

filters, IPS, Anomaly Behavior, Application, Firewall, IPSec

 

 

VPN, SSL VPN, and HTTPS Smart Block.

 

 

 

 

Protocols

Select one or more check boxes to specify the protocols that are

 

 

queried.

 

 

The following protocols can be selected:

 

 

• For Traffic and Malware logs: SMTP, POP3, IMAP, HTTP,

 

 

FTP, and HTTPS.

 

 

• For the Spam log: SMTP and POP3.

 

 

• For the Email filters log: SMTP, POP3, and IMAP.

 

 

• For the Content filters log: HTTP, FTP, and HTTPS.

 

 

 

 

Domain

The domain name that is queried.

 

 

This field is available for the following logs:

 

 

Traffic, Spam, Malware, Email filters, Content filters, and

 

 

Application.

 

User

The user name that is queried.

 

 

This field is available for the following logs:

 

 

Traffic, Spam, Malware, Email filters, Content filters, and

 

 

Application.

 

Client IP

The client IP address that is queried.

 

 

This field is available for the following logs:

 

 

Traffic, Spam, Malware, Content filters, IPS, Anomaly Behavior,

 

 

Application.

 

Server IP

The server IP address that is queried.

 

 

This field is available for the following logs:

 

 

Traffic, Malware, Content filters, IPS, Anomaly Behavior,

 

 

Application.

Monitor System Access and Performance

511

Page 511
Image 511
NETGEAR STM150EW-100NAS, UTM5EW-100NAS manual 511